{"id":185,"date":"2025-04-04T17:40:25","date_gmt":"2025-04-04T17:40:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/?page_id=185"},"modified":"2025-04-28T16:57:58","modified_gmt":"2025-04-28T16:57:58","slug":"photos-video","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/photos-video\/","title":{"rendered":"Photos\/Video"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"791\" src=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-1024x791.png\" alt=\"\" class=\"wp-image-247\" srcset=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-1024x791.png 1024w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-300x232.png 300w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-768x594.png 768w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-1536x1187.png 1536w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-600x464.png 600w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920-945x730.png 945w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6573326_1920.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Reference: Hassan, Mohamed. (2021). <em>phishing-6573326<\/em> [Photograph]. Pixabay. https:\/\/pixabay.com\/vectors\/phishing-credentials-data-login-6573326\/.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-1024x683.jpg\" alt=\"\" class=\"wp-image-248\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-600x400.jpg 600w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash-945x630.jpg 945w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/fahim-muntashir-14JOIxmsOqA-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Reference: Muntashir, Fahim. (2021). <em>HackNSU_S03<\/em> [Photograph]. Unsplash. https:\/\/unsplash.com\/photos\/a-man-using-a-laptop-computer-on-a-wooden-table-14JOIxmsOqA. <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"732\" src=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-1024x732.png\" alt=\"\" class=\"wp-image-249\" srcset=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-1024x732.png 1024w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-300x214.png 300w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-768x549.png 768w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-1536x1098.png 1536w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-600x429.png 600w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920-945x675.png 945w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/phishing-6926470_1920.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Reference: Hassan, Mohamed. (2022). <em>phishing-6926470<\/em> [Photograph]. Pixabay. https:\/\/pixabay.com\/vectors\/phishing-fraud-hacking-online-fraud-6926470\/. <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"757\" src=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280-1024x757.png\" alt=\"\" class=\"wp-image-250\" srcset=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280-1024x757.png 1024w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280-300x222.png 300w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280-768x568.png 768w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280-600x443.png 600w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280-945x698.png 945w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/cybersecurity-6949298_1280.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Reference: s7akti. (2022). <em>cybersecurity-6949298<\/em> [Photograph]. Pixabay. https:\/\/pixabay.com\/vectors\/cybersecurity-computer-security-6949298\/. <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-1024x683.jpg\" alt=\"\" class=\"wp-image-251\" srcset=\"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-600x400.jpg 600w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash-945x630.jpg 945w, https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-content\/uploads\/sites\/38186\/2025\/04\/boitumelo-o_tcYADlSt8-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Reference: Boitumelo. (2022). <em>boitumelo-0_tcYADISt8<\/em> [Photograph]. Unsplash. https:\/\/unsplash.com\/photos\/a-desk-with-several-monitors-o_tcYADlSt8. <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Social Engineering - How Bad Guys Hack Users\" width=\"676\" height=\"380\" src=\"https:\/\/www.youtube.com\/embed\/uMkOphesrqI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Reference: IBM Technology. (2023, June 2). <em>Social Engineering &#8211; How Bad Guys Hack Users<\/em> [Video]. YouTube. https:\/\/www.youtube.com\/watch?v=uMkOphesrqI. <\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30344,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/pages\/185"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/users\/30344"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/pages\/185\/revisions"}],"predecessor-version":[{"id":252,"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/pages\/185\/revisions\/252"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jamesk-eportfolio\/wp-json\/wp\/v2\/media?parent=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}