{"id":345,"date":"2025-08-12T01:28:31","date_gmt":"2025-08-12T01:28:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/?page_id=345"},"modified":"2025-08-12T01:53:45","modified_gmt":"2025-08-12T01:53:45","slug":"case-analysis-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/phil-355e\/case-analysis-2\/","title":{"rendered":"Case Analysis #6"},"content":{"rendered":"\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-19b6b465-b5ad-448e-8ed8-5c5995836a29\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2025\/08\/Case-Analysis-6.4.docx\">Here is the download for case analysis: Case-Analysis-6.4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2025\/08\/Case-Analysis-6.4.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-19b6b465-b5ad-448e-8ed8-5c5995836a29\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28672,"featured_media":0,"parent":207,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/345"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/users\/28672"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/345\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/345\/revisions\/352"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/207"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/media?parent=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}