{"id":232,"date":"2023-12-10T16:45:43","date_gmt":"2023-12-10T16:45:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/?page_id=232"},"modified":"2023-12-10T17:02:20","modified_gmt":"2023-12-10T17:02:20","slug":"photos-and-videos","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/photos-and-videos\/","title":{"rendered":"Photos and Videos"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456-1024x561.jpg\" alt=\"\" class=\"wp-image-236\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456-1024x561.jpg 1024w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456-300x164.jpg 300w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456-768x421.jpg 768w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456-600x329.jpg 600w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456-945x518.jpg 945w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8456.jpg 1045w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Team Collaboration:<\/strong><\/p>\n\n\n\n<p>Showcasing a team of cybersecurity professionals engaged in a collaborative discussion or planning session. This highlights the social aspect of cybersecurity work and the importance of teamwork.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460-977x1024.jpg\" alt=\"\" class=\"wp-image-237\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460-977x1024.jpg 977w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460-286x300.jpg 286w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460-768x805.jpg 768w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460-600x629.jpg 600w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460-945x991.jpg 945w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8460.jpg 1097w\" sizes=\"(max-width: 977px) 100vw, 977px\" \/><\/a><\/figure>\n\n\n\n<p><strong>User Training<\/strong>:<\/p>\n\n\n\n<p>Depicting a scene where cybersecurity experts is conducting a training session for a user on best practices for online safety. This reflects the social science aspect of educating individuals to enhance overall cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"625\" src=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461-1024x625.jpg\" alt=\"\" class=\"wp-image-239\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461-1024x625.jpg 1024w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461-300x183.jpg 300w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461-768x469.jpg 768w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461-600x366.jpg 600w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461-945x577.jpg 945w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8461.jpg 1170w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Social Engineering Awareness<\/strong>:<\/p>\n\n\n\n<p>A scenario where individuals are being made aware of social engineering tactics. This could involve a simulated phishing training session or a poster campaign emphasizing the human factor in cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"968\" height=\"539\" src=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462.jpg\" alt=\"\" class=\"wp-image-240\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462.jpg 968w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462-300x167.jpg 300w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462-768x428.jpg 768w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462-600x334.jpg 600w, https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-content\/uploads\/sites\/34241\/2023\/12\/IMG_8462-945x526.jpg 945w\" sizes=\"(max-width: 968px) 100vw, 968px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Policy Development:<\/strong><\/p>\n\n\n\n<ul>\n<li>Displaying a setting where cybersecurity policies and guidelines are being discussed or formulated. This could involve policymakers, legal experts, and cybersecurity professionals collaborating to address the social and legal aspects of cybersecurity.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What is Social Engineering? | Proofpoint Cybersecurity Education Series\" width=\"676\" height=\"380\" src=\"https:\/\/www.youtube.com\/embed\/9U-JgdUkaTQ\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Social engineering is a form of manipulation where attackers exploit human psychology to gain access to sensitive information. It often involves tricking individuals into divulging confidential data or performing actions that compromise security. Common tactics include phishing emails, phone scams, or impersonating trusted entities. By exploiting trust and human behavior, social engineering is a significant cybersecurity threat. Staying vigilant, recognizing red flags, and educating users are essential in preventing social engineering attacks.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Team Collaboration: Showcasing a team of cybersecurity professionals engaged in a collaborative discussion or planning session. This highlights the social aspect of cybersecurity work and the importance of teamwork. User Training: Depicting a scene where cybersecurity experts is conducting a&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/photos-and-videos\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26193,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/pages\/232"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/users\/26193"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/comments?post=232"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/pages\/232\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/pages\/232\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donovanbigycyse\/wp-json\/wp\/v2\/media?parent=232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}