{"id":120,"date":"2025-09-14T02:57:08","date_gmt":"2025-09-14T02:57:08","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-09-14T05:35:58","modified_gmt":"2025-09-14T05:35:58","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"wp-block-cover alignleft\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"380\" class=\"wp-block-cover__image-background wp-image-294\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/cyber.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/cyber.jpg 728w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/cyber-300x157.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/cyber-575x300.jpg 575w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<pre class=\"wp-block-verse has-text-align-left has-small-font-size\">Cybersecurity isn't just about technology its about people too <\/pre>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover aligncenter\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" class=\"wp-block-cover__image-background wp-image-297\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Cybersecurity-How-Social-Media-Reshaped-The-World-In-10-Years-2.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Cybersecurity-How-Social-Media-Reshaped-The-World-In-10-Years-2.jpg 1000w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Cybersecurity-How-Social-Media-Reshaped-The-World-In-10-Years-2-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Cybersecurity-How-Social-Media-Reshaped-The-World-In-10-Years-2-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Cybersecurity-How-Social-Media-Reshaped-The-World-In-10-Years-2-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Cybersecurity-How-Social-Media-Reshaped-The-World-In-10-Years-2-450x300.jpg 450w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-small-font-size\">Connects to sociology because of online presence<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" class=\"wp-block-cover__image-background wp-image-298\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/images.jpeg\" data-object-fit=\"cover\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-small-font-size\">Technology has many policies to help keep us safe <\/p>\n<\/div><\/div>\n\n\n\n<p><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-admin\/edit.php?post_type=page\"><\/a><\/p>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-block-cover__image-background wp-image-300\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/leadspace_article-1-1024x512.jpeg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/leadspace_article-1-1024x512.jpeg 1024w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/leadspace_article-1-300x150.jpeg 300w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/leadspace_article-1-768x384.jpeg 768w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/leadspace_article-1-600x300.jpeg 600w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/leadspace_article-1.jpeg 1472w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-small-font-size\">Criminology and psychology aid in the analysis of suspicious conduct. Cybersecurity can be strengthened by understanding human patterns.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"563\" class=\"wp-block-cover__image-background wp-image-301\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Global-Cybersecurity.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Global-Cybersecurity.jpg 1000w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Global-Cybersecurity-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Global-Cybersecurity-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-content\/uploads\/sites\/39623\/2025\/09\/Global-Cybersecurity-533x300.jpg 533w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-small-font-size\">Cybersecurity is worldwide. Sociology and economics demonstrate how a single cyberattack can have a global impact on governments, businesses, and society.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":31423,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/users\/31423"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/pages\/120\/revisions\/303"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sjasmine\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}