{"id":342,"date":"2025-08-12T01:27:31","date_gmt":"2025-08-12T01:27:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/?page_id=342"},"modified":"2025-08-12T01:55:13","modified_gmt":"2025-08-12T01:55:13","slug":"case-analysis-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/phil-355e\/case-analysis-1\/","title":{"rendered":"Case Analysis #7"},"content":{"rendered":"\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c69d885f-c4fe-4ace-8fa7-b550a99d2582\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2025\/08\/Case-Analysis-7.4.docx\">Here is the download for case analysis: Case-Analysis-7.4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2025\/08\/Case-Analysis-7.4.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c69d885f-c4fe-4ace-8fa7-b550a99d2582\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28672,"featured_media":0,"parent":207,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/342"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/users\/28672"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/comments?post=342"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/342\/revisions"}],"predecessor-version":[{"id":353,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/342\/revisions\/353"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/207"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/media?parent=342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}