{"id":320,"date":"2025-01-24T01:30:31","date_gmt":"2025-01-24T01:30:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/it200t\/?page_id=320"},"modified":"2025-02-07T03:27:16","modified_gmt":"2025-02-07T03:27:16","slug":"cyse201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/it200t\/cyse201s\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"553\" src=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb-1024x553.jpg\" alt=\"\" class=\"wp-image-330\" style=\"width:480px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb-1024x553.jpg 1024w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb-300x162.jpg 300w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb-768x415.jpg 768w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb-1536x830.jpg 1536w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb-2048x1107.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nist.gov\/sites\/default\/files\/images\/2019\/06\/19\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb.jpg\">https:\/\/www.nist.gov\/sites\/default\/files\/images\/2019\/06\/19\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb.jpg<\/a><\/p>\n\n\n\n<p>_________________________________________________________________________________<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"343\" src=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/1593547479052.jpg\" alt=\"\" class=\"wp-image-331\" style=\"width:345px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/1593547479052.jpg 606w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/1593547479052-300x170.jpg 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/pulse\/social-engineering-human-factor-cyber-security-satendra-gaundar-1c\">https:\/\/www.linkedin.com\/pulse\/social-engineering-human-factor-cyber-security-satendra-gaundar-1c<\/a><\/p>\n\n\n\n<p>___________________________________________________________________________________<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"341\" src=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/thumb-1024x341.jpg\" alt=\"\" class=\"wp-image-332\" style=\"width:536px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/thumb-1024x341.jpg 1024w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/thumb-300x100.jpg 300w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/thumb-768x256.jpg 768w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/thumb.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyber-labs wp-block-embed-cyber-labs\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"WOk6FgzuTV\"><a href=\"https:\/\/cyberlabsservices.com\/social-media-security-risks-challenges-and-solutions\/\">Social Media Security: Risks, Challenges, and Solutions<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Social Media Security: Risks, Challenges, and Solutions&#8221; &#8212; Cyber Labs\" src=\"https:\/\/cyberlabsservices.com\/social-media-security-risks-challenges-and-solutions\/embed\/#?secret=fnmj05YD4A#?secret=WOk6FgzuTV\" data-secret=\"WOk6FgzuTV\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">________________________________________________________________________________________<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/SocialEngineering_bg-1024x576.png\" alt=\"\" class=\"wp-image-333\" style=\"width:433px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/SocialEngineering_bg-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/SocialEngineering_bg-300x169.png 300w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/SocialEngineering_bg-768x432.png 768w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/SocialEngineering_bg-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/SocialEngineering_bg.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-teaching-security wp-block-embed-teaching-security\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"WAV6Q81mdb\"><a href=\"https:\/\/teachingsecurity.org\/lesson-3-social-engineering-the-oldest-hack\/\">Lesson 3 \u2013 Social Engineering: The Oldest Hack<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Lesson 3 \u2013 Social Engineering: The Oldest Hack&#8221; &#8212; Teaching Security\" src=\"https:\/\/teachingsecurity.org\/lesson-3-social-engineering-the-oldest-hack\/embed\/#?secret=3Ev3xbwLJa#?secret=WAV6Q81mdb\" data-secret=\"WAV6Q81mdb\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">_________________________________________________________________________________________<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"408\" src=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/istockphoto-1411514992-612x612-1.jpg\" alt=\"\" class=\"wp-image-334\" srcset=\"https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/istockphoto-1411514992-612x612-1.jpg 612w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/istockphoto-1411514992-612x612-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/it200t\/wp-content\/uploads\/sites\/35782\/2025\/02\/istockphoto-1411514992-612x612-1-140x94.jpg 140w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/www.istockphoto.com\/photos\/social-engineering\">https:\/\/www.istockphoto.com\/photos\/social-engineering<\/a><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.nist.gov\/sites\/default\/files\/images\/2019\/06\/19\/sdecoret_pi_hack_shutterstock_617737619_hr_2mb.jpg _________________________________________________________________________________ https:\/\/www.linkedin.com\/pulse\/social-engineering-human-factor-cyber-security-satendra-gaundar-1c ___________________________________________________________________________________<\/p>\n","protected":false},"author":28617,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/pages\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/users\/28617"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/pages\/320\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/it200t\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}