{"id":192,"date":"2026-02-09T16:46:23","date_gmt":"2026-02-09T16:46:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/?p=192"},"modified":"2026-02-09T16:46:23","modified_gmt":"2026-02-09T16:46:23","slug":"cyse-201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/2026\/02\/09\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><a href=\"https:\/\/img.freepik.com\/premium-photo\/cybersecurity-expert-monitoring-protecting-network-computer-systems_674594-3227.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"371\" src=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image.png\" alt=\"\" class=\"wp-image-193\" style=\"width:461px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image.png 626w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-300x178.png 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure><\/div>\n\n\n<p style=\"font-size:15px\">Cybersecurity is fundamentally about human behavior. Technology doesn&#8217;t attack by itself; people do. People make mistakes, fall for scams, and ignore policies or find workarounds. Cybersecurity uses psychology, sociology, and behavioral science to design defenses that match real human behavior. <br><br><a href=\"https:\/\/img.freepik.com\/premium-photo\/cybersecurity-expert-monitoring-protecting-network-computer-systems_674594-3227.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/img.freepik.com\/premium-photo\/cybersecurity-expert-monitoring-protecting-network-computer-systems_674594-3227.jpg<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1-1024x576.png\" alt=\"\" class=\"wp-image-194\" style=\"width:463px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1-842x474.png 842w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p>Security policies are social systems, not just technical rules. Organizations succeed or fail at security based on culture, incentives, and power structure. This is where your strength, connecting organizational patterns, really shines; security is a social ecosystem. <\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/onlinedegrees.sandiego.edu\/wp-content\/uploads\/2020\/06\/iStock-1194430861-1-2.jpeg\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/onlinedegrees.sandiego.edu\/wp-content\/uploads\/2020\/06\/iStock-1194430861-1-2.jpeg<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"692\" src=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2-1024x692.png\" alt=\"\" class=\"wp-image-195\" style=\"width:460px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2-1024x692.png 1024w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2-300x203.png 300w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2-768x519.png 768w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2-842x569.png 842w, https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-content\/uploads\/sites\/40685\/2026\/02\/image-2.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p>Cyberthreats are shaped by politics, economics, and society. It&#8217;s tied to Geopolitics, Economics, Law and Policy, and Social movements. Social science provides the frameworks to understand these broader forces. <\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/media.defense.gov\/2023\/May\/02\/2003213556\/1280\/1280\/0\/230421-Z-GQ603-1523Y.JPG\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/media.defense.gov\/2023\/May\/02\/2003213556\/1280\/1280\/0\/230421-Z-GQ603-1523Y.JPG<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is fundamentally about human behavior. Technology doesn&#8217;t attack by itself; people do. People make mistakes, fall for scams, and ignore policies or find workarounds. Cybersecurity uses psychology, sociology, and behavioral science to design defenses that match real human behavior. https:\/\/img.freepik.com\/premium-photo\/cybersecurity-expert-monitoring-protecting-network-computer-systems_674594-3227.jpg Security policies are social systems, not just technical rules. Organizations succeed or fail at [&hellip;]<\/p>\n","protected":false},"author":31521,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/posts\/192"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/users\/31521"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/posts\/192\/revisions"}],"predecessor-version":[{"id":196,"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/posts\/192\/revisions\/196"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/media?parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/categories?post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kbalm-cyse201s\/wp-json\/wp\/v2\/tags?post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}