{"id":143,"date":"2026-02-09T21:23:05","date_gmt":"2026-02-09T21:23:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/?page_id=143"},"modified":"2026-02-10T21:48:34","modified_gmt":"2026-02-10T21:48:34","slug":"cyse-201s-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/cyse-201s-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-1024x683.jpg\" alt=\"\" class=\"wp-image-162\" srcset=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-2048x1365.jpg 2048w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-600x400.jpg 600w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/amazon-scam-email1-2-945x630.jpg 945w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/images-1-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"318\" height=\"159\" src=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/images-1-2.jpg\" alt=\"\" class=\"wp-image-160\" srcset=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/images-1-2.jpg 318w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/images-1-2-300x150.jpg 300w\" sizes=\"(max-width: 318px) 100vw, 318px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-663x1024.jpg\" alt=\"\" class=\"wp-image-161\" srcset=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-663x1024.jpg 663w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-194x300.jpg 194w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-768x1187.jpg 768w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-994x1536.jpg 994w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-1325x2048.jpg 1325w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-600x927.jpg 600w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-945x1460.jpg 945w, https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-content\/uploads\/sites\/40706\/2026\/02\/IEL-CSAM-Security-First-Posters-2018-1-2-scaled.jpg 1656w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/a><\/figure>\n<\/figure>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p>The images below represent how cybersecurity directly affects people and society. Cyber threats are not just technical problems, they rely heavily on human behavior, trust, and decision-making. Social engineering attacks such as phishing take advantage of fear, urgency, and lack of awareness, showing why cybersecurity must be studied alongside social sciences.<\/p>\n\n\n\n<p>The first image shows a fake Amazon payment alert email, which is a common phishing tactic used to trick users into clicking malicious links or providing personal information. This highlights how attackers exploit familiar brands and social trust rather than technical vulnerabilities.<\/p>\n\n\n\n<p>The second image illustrates different types of cyber threats, including hacking, malware, spyware, and data breaches. It emphasizes how personal data is constantly at risk and why individuals, businesses, and governments must work together to protect information.<\/p>\n\n\n\n<p>The third image focuses on phishing awareness and encourages users to think before clicking links. This connects directly to social science concepts like human behavior, education, and awareness, showing that preventing cybercrime often starts with informed users.<\/p>\n\n\n\n<p>Together, these images show that cybersecurity is deeply connected to social behavior, awareness, and responsibility, not just technology.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sources<\/h2>\n\n\n\n<p>Image 1 (Amazon phishing email example):<br><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams<\/a><\/p>\n\n\n\n<p>Image 2 (Cybersecurity threats graphic):<br><a href=\"https:\/\/www.freepik.com\">https:\/\/www.freepik.com<\/a><\/p>\n\n\n\n<p>Image 3 (Phishing awareness poster):<br>Inspired eLearning, <a>https:\/\/www.inspiredelearning.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The images below represent how cybersecurity directly affects people and society. Cyber threats are not just technical problems, they rely heavily on human behavior, trust, and decision-making. Social engineering attacks such as phishing take advantage of fear, urgency, and lack&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/cyse-201s-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":32101,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/pages\/143"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/users\/32101"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/comments?post=143"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/pages\/143\/revisions"}],"predecessor-version":[{"id":163,"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/pages\/143\/revisions\/163"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josiaheportfolio\/wp-json\/wp\/v2\/media?parent=143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}