{"id":120,"date":"2025-02-03T22:44:54","date_gmt":"2025-02-03T22:44:54","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-02-04T00:00:54","modified_gmt":"2025-02-04T00:00:54","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/","title":{"rendered":"Welcome!"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Pictures that I believe represent cybersecurity and social sciences well<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/1738626641951-b465f694-46a8-4b30-8c67-25a93aea6ea7_1.jpg\" alt=\"\" class=\"wp-image-314\" style=\"width:275px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/1738626641951-b465f694-46a8-4b30-8c67-25a93aea6ea7_1.jpg 1024w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/1738626641951-b465f694-46a8-4b30-8c67-25a93aea6ea7_1-300x176.jpg 300w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/1738626641951-b465f694-46a8-4b30-8c67-25a93aea6ea7_1-768x450.jpg 768w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/1738626641951-b465f694-46a8-4b30-8c67-25a93aea6ea7_1-512x300.jpg 512w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">https:\/\/www.darkreading.com\/cybersecurity-operations\/can-cybersecurity-be-unifying-factor-in-digital-trade-negotiations-<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-1024x512.jpeg\" alt=\"\" class=\"wp-image-309\" style=\"width:280px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-1024x512.jpeg 1024w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-300x150.jpeg 300w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-768x384.jpeg 768w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-1536x768.jpeg 1536w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-2048x1024.jpeg 2048w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-1-600x300.jpeg 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">https:\/\/www.technologysolutions.net<br>\/blog\/decoding-the-5-cs-of-cybersecurity\/<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"384\" height=\"323\" src=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-2.png\" alt=\"\" class=\"wp-image-310\" style=\"width:381px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-2.png 384w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-2-300x252.png 300w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-2-357x300.png 357w\" sizes=\"(max-width: 384px) 100vw, 384px\" \/><figcaption class=\"wp-element-caption\">https:\/\/www.transportation.gov\/priorities\/cybersecurity<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"385\" src=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-3.png\" alt=\"\" class=\"wp-image-311\" style=\"width:366px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-3.png 685w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-3-300x169.png 300w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-3-534x300.png 534w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><figcaption class=\"wp-element-caption\">https:\/\/link.springer.com\/article\/10.1007\/s10588-020-09322-9<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-4.jpg\" alt=\"\" class=\"wp-image-312\" style=\"width:265px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-4.jpg 800w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-4-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-4-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-content\/uploads\/sites\/38488\/2025\/02\/Eportfolio-Pic-4-533x300.jpg 533w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">https:\/\/www.tripwire.com\/state-of-security\/beyond-firewall-how-social-engineers-use-psychology-compromise-organizational<\/figcaption><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Pictures that I believe represent cybersecurity and social sciences well<\/p>\n","protected":false},"author":30427,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/users\/30427"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages\/120\/revisions\/326"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}