{"id":305,"date":"2021-12-09T22:18:16","date_gmt":"2021-12-09T22:18:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hvtcourse\/?page_id=305"},"modified":"2021-12-09T22:21:34","modified_gmt":"2021-12-09T22:21:34","slug":"cyse-201s-media","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hvtcourse\/cyse-201s-media\/","title":{"rendered":"CYSE 201 Media"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/Encryption-backdoors-are-a-bad-idea-heres-why...-1024x512.jpg\" alt=\"\" class=\"wp-image-301\" width=\"868\" height=\"434\" srcset=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/Encryption-backdoors-are-a-bad-idea-heres-why...-1024x512.jpg 1024w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/Encryption-backdoors-are-a-bad-idea-heres-why...-300x150.jpg 300w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/Encryption-backdoors-are-a-bad-idea-heres-why...-768x384.jpg 768w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/Encryption-backdoors-are-a-bad-idea-heres-why...-600x300.jpg 600w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/Encryption-backdoors-are-a-bad-idea-heres-why....jpg 1200w\" sizes=\"(max-width: 868px) 100vw, 868px\" \/><figcaption>Do you support federally mandated encryption backdoors?<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"535\" src=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/itc-blog-on-cyberattacks-jan-2021-fig-1.jpg\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/itc-blog-on-cyberattacks-jan-2021-fig-1.jpg 650w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/itc-blog-on-cyberattacks-jan-2021-fig-1-300x247.jpg 300w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/itc-blog-on-cyberattacks-jan-2021-fig-1-364x300.jpg 364w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption>How would you improve protection of critical infrastructure from cyber attacks?<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"1010\" src=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/PI_2019.11.14_privacy_0-04.png\" alt=\"\" class=\"wp-image-307\" srcset=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/PI_2019.11.14_privacy_0-04.png 840w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/PI_2019.11.14_privacy_0-04-250x300.png 250w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/PI_2019.11.14_privacy_0-04-768x923.png 768w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><figcaption>Is it possible for the government to collect too much information on their citizens? If so, what is that level?<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/image001-1024x572.png\" alt=\"\" class=\"wp-image-308\" srcset=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/image001-1024x572.png 1024w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/image001-300x168.png 300w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/image001-768x429.png 768w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/image001-537x300.png 537w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/image001.png 1528w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Do companies spend little on their cyber departments?<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What&#039;s Best: Paid Antivirus Software or Free Antivirus Software\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/e9gacXWMjOA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption>Paid and Free antivirus can both have their benefits, don&#8217;t be pressured into always buying one.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"610\" src=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/mcafeess06-1024x610.png\" alt=\"\" class=\"wp-image-309\" srcset=\"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/mcafeess06-1024x610.png 1024w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/mcafeess06-300x179.png 300w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/mcafeess06-768x458.png 768w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/mcafeess06-503x300.png 503w, https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-content\/uploads\/sites\/26097\/2021\/12\/mcafeess06.png 1250w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>McAfee is one of the worst, if not worse anti-viruses ever.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21910,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/pages\/305"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/users\/21910"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/pages\/305\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/pages\/305\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hvtcourse\/wp-json\/wp\/v2\/media?parent=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}