{"id":288,"date":"2025-01-30T18:30:47","date_gmt":"2025-01-30T18:30:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dhill036\/?page_id=288"},"modified":"2025-04-27T14:22:54","modified_gmt":"2025-04-27T14:22:54","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dhill036\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/media.cybernews.com\/images\/750w\/2020\/12\/What-is-AES-Encryption.jpg\" alt=\"Encryption is a key tool in cybersecurity.\" \/><figcaption class=\"wp-element-caption\">Craig Taylor. (2022, March 4) AES Encryption. Retrieved January 28, 2025 from https:\/\/cyberhoot.com\/cybrary\/aes-encryption\/.<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"626\" src=\"https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/12-Stalking-Prey-An-RF-Hackers-Perspective-1.jpg\" alt=\"\" class=\"wp-image-317\" srcset=\"https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/12-Stalking-Prey-An-RF-Hackers-Perspective-1.jpg 900w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/12-Stalking-Prey-An-RF-Hackers-Perspective-1-300x209.jpg 300w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/12-Stalking-Prey-An-RF-Hackers-Perspective-1-768x534.jpg 768w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/12-Stalking-Prey-An-RF-Hackers-Perspective-1-431x300.jpg 431w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\">Rick Mellendick. (2014) Stalking Prey: An RF Hacker\u2019s Perspective. Retrieved January 28, 2025 from https:\/\/www.uscybersecurity.net\/csmag\/stalking-prey-an-rf-hackers-perspective\/.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"194\" src=\"https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/download-1.jpg\" alt=\"\" class=\"wp-image-309\" style=\"width:838px;height:auto\" \/><figcaption class=\"wp-element-caption\">Charles Griffiths. (2025, January) The Latest 2025 Phishing Statistics. Retrieved January 28, 2025 from https:\/\/aag-it.com\/the-latest-phishing-statistics\/.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1004\" src=\"https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/cellularillustration.jpg\" alt=\"\" class=\"wp-image-311\" srcset=\"https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/cellularillustration.jpg 1000w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/cellularillustration-300x300.jpg 300w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/cellularillustration-150x150.jpg 150w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/cellularillustration-768x771.jpg 768w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/cellularillustration-299x300.jpg 299w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Rambus Press. (2017, October 2) Living on the edge with 5G and fog computing. Retrieved January 28, 2025 from https:\/\/www.rambus.com\/blogs\/living-on-the-edge-with-5g-and-fog-computing\/.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"http:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/CyberSecurity-Blog-Series-Social-Engineering-1-1024x640.jpg\" alt=\"\" class=\"wp-image-313\" srcset=\"https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/CyberSecurity-Blog-Series-Social-Engineering-1-1024x640.jpg 1024w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/CyberSecurity-Blog-Series-Social-Engineering-1-300x188.jpg 300w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/CyberSecurity-Blog-Series-Social-Engineering-1-768x480.jpg 768w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/CyberSecurity-Blog-Series-Social-Engineering-1-480x300.jpg 480w, https:\/\/sites.wp.odu.edu\/dhill036\/wp-content\/uploads\/sites\/38343\/2025\/02\/CyberSecurity-Blog-Series-Social-Engineering-1.jpg 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Urban Network. (2022, September) What is Social Engineering?. <em>How to<\/em> Retrieved January 28, 2025 from https:\/\/www.urbannetwork.co.uk\/social-engineering\/.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30353,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[]"},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/pages\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/users\/30353"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/pages\/288\/revisions"}],"predecessor-version":[{"id":384,"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/pages\/288\/revisions\/384"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dhill036\/wp-json\/wp\/v2\/media?parent=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}