{"id":120,"date":"2024-09-23T00:52:31","date_gmt":"2024-09-23T00:52:31","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-02-07T01:16:42","modified_gmt":"2025-02-07T01:16:42","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hannahklein\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:32% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"541\" height=\"421\" src=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Brain-lock.png\" alt=\"\" class=\"wp-image-368 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Brain-lock.png 541w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Brain-lock-300x233.png 300w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Brain-lock-386x300.png 386w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Represents the intersection of cybersecurity (protection) and the social sciences (human cognition). <a href=\"https:\/\/www.cybersecuritysnacks.com\/\">Cybersecurity Snacks<\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:32% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Hakers.jpg\" alt=\"\" class=\"wp-image-371 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Hakers.jpg 800w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Hakers-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Hakers-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Hakers-400x300.jpg 400w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Hackers interacting with a digital interface while wearing the infamous &#8220;Guy Fawkes mask&#8221;, representing the psychological aspects of cyber threats. <a href=\"https:\/\/cyberguy.com\/news\/massive-data-breach-exposes-over-3-million-americans-personal-information-to-cybercriminals\/\">Massive data breach exposes over 3 million Americans&#8217; personal information to cybercriminals &#8211; CyberGuy<\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:39% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Cybersecurity_1200x628-202455-1024x536-1.png\" alt=\"\" class=\"wp-image-372 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Cybersecurity_1200x628-202455-1024x536-1.png 1024w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Cybersecurity_1200x628-202455-1024x536-1-300x157.png 300w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Cybersecurity_1200x628-202455-1024x536-1-768x402.png 768w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/Cybersecurity_1200x628-202455-1024x536-1-573x300.png 573w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>A person using their phone surrounded by floating data streams, symbolizing how personal data is exposed and protected in society.<a href=\"https:\/\/executivegov.com\/articles\/10-cybersecurity-company-contractors\/\">10 Government Cybersecurity Company Contractors<\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:42% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/cybersecurity-cyberthreats-1024x578.png\" alt=\"\" class=\"wp-image-373 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/cybersecurity-cyberthreats-1024x578.png 1024w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/cybersecurity-cyberthreats-300x169.png 300w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/cybersecurity-cyberthreats-768x433.png 768w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/cybersecurity-cyberthreats-532x300.png 532w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/cybersecurity-cyberthreats.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>A globe with digital attacks connecting different countries, illustrating cyber warfare\u2019s role in international relations. <a href=\"https:\/\/securitybrief.co.uk\/story\/check-point-forecasts-rising-ai-enabled-cyberthreats-for-2024\">Check Point forecasts rising AI-enabled cyberthreats for 2024<\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:42% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"353\" height=\"143\" src=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/5th.png\" alt=\"\" class=\"wp-image-374 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/5th.png 353w, https:\/\/sites.wp.odu.edu\/hannahklein\/wp-content\/uploads\/sites\/37257\/2025\/02\/5th-300x122.png 300w\" sizes=\"(max-width: 353px) 100vw, 353px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Represents the detection of cyber threats and vulnerabilities. The presence of computer code suggests an ongoing system scan or potential breach, highlighting the importance of real-time monitoring in cybersecurity. <a href=\"https:\/\/www.kloepfel-magazin.com\/en\/whitepaper\/dangers-cyber-attacks-8002\/\">Dangers from cyber attacks<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Represents the intersection of cybersecurity (protection) and the social sciences (human cognition). Cybersecurity Snacks Hackers interacting with a digital interface while wearing the infamous &#8220;Guy Fawkes mask&#8221;, representing the psychological aspects of cyber threats. Massive data breach exposes over 3 million Americans&#8217; personal information to cybercriminals &#8211; CyberGuy A person using their phone surrounded by&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hannahklein\/\">Read More<\/a><\/div>\n","protected":false},"author":29799,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/users\/29799"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages\/120\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}