{"id":312,"date":"2024-12-04T01:17:56","date_gmt":"2024-12-04T01:17:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/matt-surratt\/?page_id=312"},"modified":"2024-12-04T18:40:00","modified_gmt":"2024-12-04T18:40:00","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/matt-surratt\/cyse-201s\/","title":{"rendered":"CYSE-201S"},"content":{"rendered":"\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/journals\/\">Journals<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/career-paper\/\">Career Paper<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/article-reviews\/\">Article Reviews<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Science Behind Human Hacking (Social Engineering) - Christopher Hadnagy\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/JraHV1ai9eQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/httpswww.comparitech.cominternet-providerscyberbullying-statistics-622x1024.jpg\" alt=\"\" class=\"wp-image-346\" srcset=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/httpswww.comparitech.cominternet-providerscyberbullying-statistics-622x1024.jpg 622w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/httpswww.comparitech.cominternet-providerscyberbullying-statistics-182x300.jpg 182w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/httpswww.comparitech.cominternet-providerscyberbullying-statistics-768x1264.jpg 768w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/httpswww.comparitech.cominternet-providerscyberbullying-statistics.jpg 800w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/figure>\n\n\n\n<p>Source: https:\/\/www.comparitech.com\/internet-providers\/cyberbullying-statistics\/<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/phishing-scam.jpg\" alt=\"\" class=\"wp-image-347\" srcset=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/phishing-scam.jpg 1024w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/phishing-scam-300x150.jpg 300w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/phishing-scam-768x384.jpg 768w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/phishing-scam-600x300.jpg 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/mdaquest.org\/avoid-online-scams-targeting-people-with-disabilities\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"537\" src=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1-1024x537.jpg\" alt=\"\" class=\"wp-image-348\" srcset=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1-1024x537.jpg 1024w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1-300x157.jpg 300w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1-768x402.jpg 768w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1-1536x805.jpg 1536w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1-573x300.jpg 573w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/blog-post-cybercrime_-scaled-1.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/siccura.com\/the-psychology-behind-phishing-how-cybercriminals-manipulate-you\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/001Pic7-1024x573.png\" alt=\"\" class=\"wp-image-349\" srcset=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/001Pic7-1024x573.png 1024w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/001Pic7-300x168.png 300w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/001Pic7-768x430.png 768w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/001Pic7-536x300.png 536w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/001Pic7.png 1504w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/www.cyber-risk-gmbh.com\/Psychological_Exploitation_of_Social_Engineering_Attacks.html<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"565\" height=\"400\" src=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/1-s2.0-S2949791423000349-gr4.jpg\" alt=\"\" class=\"wp-image-350\" srcset=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/1-s2.0-S2949791423000349-gr4.jpg 565w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/1-s2.0-S2949791423000349-gr4-300x212.jpg 300w, https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-content\/uploads\/sites\/37116\/2024\/12\/1-s2.0-S2949791423000349-gr4-424x300.jpg 424w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><figcaption class=\"wp-element-caption\">Sorce: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2949791423000349<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Source: https:\/\/www.comparitech.com\/internet-providers\/cyberbullying-statistics\/<\/p>\n","protected":false},"author":29497,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/pages\/312"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/users\/29497"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/pages\/312\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/pages\/312\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/media?parent=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}