{"id":123,"date":"2025-01-15T13:10:49","date_gmt":"2025-01-15T13:10:49","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-01-31T19:02:53","modified_gmt":"2025-01-31T19:02:53","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/gunnarasper\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1-1024x768.jpeg\" alt=\"The Impact of Social Engineering on Cybersecurity\" class=\"wp-image-255\" srcset=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1-1024x768.jpeg 1024w, https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1-300x225.jpeg 300w, https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1-768x576.jpeg 768w, https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1-400x300.jpeg 400w, https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/image-1.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/cyber-security-internet-computer-network-protection-privacy-safety.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"540\" height=\"360\" src=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/cyber-security-internet-computer-network-protection-privacy-safety.jpg\" alt=\"\" class=\"wp-image-256\" srcset=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/cyber-security-internet-computer-network-protection-privacy-safety.jpg 540w, https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/cyber-security-internet-computer-network-protection-privacy-safety-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/cyber-security-internet-computer-network-protection-privacy-safety-450x300.jpg 450w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/OIP.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"274\" height=\"183\" src=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/OIP.jpg\" alt=\"\" class=\"wp-image-257\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/OIP-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"280\" height=\"180\" src=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/OIP-1.jpg\" alt=\"\" class=\"wp-image-258\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/OIP-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"263\" height=\"180\" src=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-content\/uploads\/sites\/38031\/2025\/01\/OIP-2.jpg\" alt=\"\" class=\"wp-image-259\" \/><\/a><\/figure>\n<\/figure>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">These pictures reflect my feelings of cyber security and social science as well as their relation. I hope you enjoy! Links to websites: <a href=\"https:\/\/www.rswebsols.com\/privacy-security-health-risks-social-media-avoid\/\">Privacy, Security &amp; Health Risks of Social Media! How to Avoid?<\/a>, <a href=\"https:\/\/thecyberpatch.com\/cybersecurity-is-everyones-responsibility\/\">Cybersecurity is Everyone\u2019s Responsibility | TheCyberPatch<\/a>, <a href=\"https:\/\/www.nccgroup.com\/us\/newsroom\/cyber-security-is-evolving-into-a-science\/\">nccgroup.com\/us\/newsroom\/cyber-security-is-evolving-into-a-science\/<\/a>, <a href=\"https:\/\/www.bettertechtips.com\/internet\/5-cybersecurity-regulations-you-should-know-as-a-business-owner\/\">5 Cybersecurity Regulations You Should Know as a Business Owner \u2013 Better Tech Tips<\/a>, <a href=\"https:\/\/itbrief.com.au\/story\/2024-cybersecurity-trends-ai-cloud-and-threat-intelligence\">2024 cybersecurity trends: AI, cloud and threat intelligence<\/a>. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center\">\n<p>\u201cSuccess is stumbling from failure to failure with no loss of enthusiasm.\u201d<\/p>\n<cite>&#8211; Winston Churchill<\/cite><\/blockquote>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\">Contact Me<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>These pictures reflect my feelings of cyber security and social science as well as their relation. I hope you enjoy! Links to websites: Privacy, Security &amp; Health Risks of Social Media! How to Avoid?, Cybersecurity is Everyone\u2019s Responsibility | TheCyberPatch, nccgroup.com\/us\/newsroom\/cyber-security-is-evolving-into-a-science\/, 5 Cybersecurity Regulations You Should Know as a Business Owner \u2013 Better Tech Tips,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gunnarasper\/\">Read More<\/a><\/div>\n","protected":false},"author":30288,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/users\/30288"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":262,"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/pages\/123\/revisions\/262"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gunnarasper\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}