{"id":205,"date":"2026-02-07T18:22:55","date_gmt":"2026-02-07T18:22:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/?p=205"},"modified":"2026-02-07T18:25:50","modified_gmt":"2026-02-07T18:25:50","slug":"what-i-think-of-with-cybersecurity-and-technology","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/2026\/02\/07\/what-i-think-of-with-cybersecurity-and-technology\/","title":{"rendered":"What I think of with Cybersecurity and Technology"},"content":{"rendered":"\n<p>This page shows the relationship between social sciences and cybersecurity. Cybersecurity is not only a technical field; it also depends on humans to make the decisions and form trust.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"524\" src=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2.png\" alt=\"\" class=\"wp-image-194\" srcset=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2.png 1000w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2-300x157.png 300w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2-768x402.png 768w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2-600x314.png 600w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-2-945x495.png 945w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption class=\"wp-element-caption\">This image shows the human centered side of cybersecurity, by showing how a user interacts with a secure computer system. The lock symbol on the screen shows how important it is to protect personal data.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3.png\" alt=\"\" class=\"wp-image-195\" style=\"width:736px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3.png 1000w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3-300x180.png 300w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3-768x461.png 768w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3-600x360.png 600w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-3-945x567.png 945w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption class=\"wp-element-caption\">This image shows cybersecurity awareness training which shows the behavioral and social aspects on cybersecurity and educates how to prevent cyber threats.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-1024x1024.png\" alt=\"\" class=\"wp-image-196\" srcset=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-1024x1024.png 1024w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-300x300.png 300w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-150x150.png 150w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-768x768.png 768w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-600x600.png 600w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4-945x945.png 945w, https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-content\/uploads\/sites\/40427\/2026\/02\/image-4.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">This image shows that there has to be privacy and trust in cybersecurity. Each person makes their own choices and these affect how their personal data is protected in everyday scenarios.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Works Cited.<\/p>\n\n\n\n<p><a href=\"https:\/\/onlinedegrees.sandiego.edu\/entry-level-cyber-security-jobs-guide\/\">https:\/\/onlinedegrees.sandiego.edu\/entry-level-cyber-security-jobs-guide\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/aware.eccouncil.org\/cybersecurity-awareness-training-for-employees-all-you-need-to-know.html\">https:\/\/aware.eccouncil.org\/cybersecurity-awareness-training-for-employees-all-you-need-to-know.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/allaboutcookies.org\/how-to-change-privacy-settings\">https:\/\/allaboutcookies.org\/how-to-change-privacy-settings<\/a><\/p>\n\n\n<ul class=\"wp-block-categories-list CYSE201S wp-block-categories\">\t<li class=\"cat-item cat-item-6\"><a href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/category\/cyse200t\/\">CYSE200T<\/a>\n<\/li>\n\t<li class=\"cat-item cat-item-1\"><a href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/category\/uncategorized\/\">Uncategorized<\/a>\n<ul class='children'>\n\t<li class=\"cat-item cat-item-5\"><a href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/category\/uncategorized\/cyse201s\/\">CYSE201S<\/a>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>This page shows the relationship between social sciences and cybersecurity. Cybersecurity is not only a technical field; it also depends on humans to make the decisions and form trust. Works Cited. https:\/\/onlinedegrees.sandiego.edu\/entry-level-cyber-security-jobs-guide\/ https:\/\/aware.eccouncil.org\/cybersecurity-awareness-training-for-employees-all-you-need-to-know.html https:\/\/allaboutcookies.org\/how-to-change-privacy-settings<\/p>\n","protected":false},"author":31911,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts\/205"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/users\/31911"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"predecessor-version":[{"id":209,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts\/205\/revisions\/209"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}