{"id":133,"date":"2025-09-21T23:58:42","date_gmt":"2025-09-21T23:58:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2026-02-12T00:12:46","modified_gmt":"2026-02-12T00:12:46","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/it-cyse-200t-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<p>The &#8220;What Is Social Engineering?&#8221; video shows how human behavior is frequently used by cybersecurity risks in instead of or in addition to technical flaws. Social engineering attacks use social expectations, fear, and trust to press people into giving private information or taking dangerous acts. This shows the clear connection between cybersecurity and the social sciences, especially psychology, as finding abusive strategies requires an understanding of human thought and decision-making processes. Sociology is especially relevant because these attacks depend on influence and communication patterns and grow through social networks. Since social engineering takes advantage of relationships of trust and biases of thought rather than technical flaws, it is one of the most successful types of cyberattack, as explained by the social science approach.<\/p>\n<p><iframe loading=\"lazy\" title=\"Social Science elements in Cybersecurity | Episode 1\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/KHieqnhgD5U?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<div><\/div>\n<p class=\"p1\">Work Cited<\/p>\n<p>\u201cWhat Is Social Engineering?\u201d <em data-start=\"1503\" data-end=\"1512\">YouTube<\/em>, uploaded by Keeper Security, 21 May 2025, <a class=\"decorated-link\" href=\"https:\/\/www.youtube.com\/watch?v=KHieqnhgD5U\" target=\"_new\" rel=\"noopener\" data-start=\"1556\" data-end=\"1599\">https:\/\/www.youtube.com\/watch?v=KHieqnhgD5U<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The &#8220;What Is Social Engineering?&#8221; video shows how human behavior is frequently used by cybersecurity risks in instead of or in addition to technical flaws. Social engineering attacks use social expectations, fear, and trust to press people into giving private information or taking dangerous acts. This shows the clear connection between cybersecurity and the social&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31502,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/users\/31502"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/pages\/133\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}