{"id":301,"date":"2025-02-07T01:01:44","date_gmt":"2025-02-07T01:01:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/?page_id=301"},"modified":"2025-02-07T01:39:01","modified_gmt":"2025-02-07T01:39:01","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><br>Home<\/h1>\n\n\n\n<p id=\"block-7bad6e4d-0ae8-4d40-9043-49bacf1bac10\"><strong>Cybersecurity and the Social Sciences<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-4375e23b-797d-4a50-8da2-f07fb1b5cc7d\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-content\/uploads\/sites\/38494\/2025\/02\/Screenshot-2025-02-03-at-8.18.41-PM-1024x942.png\" alt=\"This image has an empty alt attribute; its file name is Screenshot-2025-02-03-at-8.18.41-PM-1024x942.png\" \/><\/figure>\n\n\n\n<p id=\"block-393c10dd-c855-4024-bacd-c35214380764\">Singh, A. (1970, December 20).&nbsp;<em>Social Engineering in cybersecurity: The evolution of a concept<\/em>. Global Tech Council. https:\/\/www.globaltechcouncil.org\/cyber-security\/social-engineering-in-cybersecurity-the-evolution-of-a-concept\/&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-bc8f92e0-03f1-46c1-9295-8d998e14694c\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-content\/uploads\/sites\/38494\/2025\/02\/Screenshot-2025-02-03-at-8.45.40-PM-1-1024x683.png\" alt=\"This image has an empty alt attribute; its file name is Screenshot-2025-02-03-at-8.45.40-PM-1-1024x683.png\" \/><\/figure>\n\n\n\n<p id=\"block-d744f037-e2da-488d-bda2-d44ba3841ba7\"><strong>Ibreakstock. (2020, June 5).&nbsp;<em>Social science word cloud concept stock illustration &#8211; illustration of Intelligence, global: 185183042<\/em>. Dreamstime. https:\/\/www.dreamstime.com\/social-science-word-cloud-concept-white-background-image185183042&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-e3337993-a4e6-4750-8a3e-68774b660634\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-content\/uploads\/sites\/38494\/2025\/02\/AdobeStock_305166874-scaled-2-1024x568.jpeg\" alt=\"This image has an empty alt attribute; its file name is AdobeStock_305166874-scaled-2-1024x568.jpeg\" \/><figcaption class=\"wp-element-caption\">Admin. (2022, March 23).&nbsp;<em>Social Engineering in Cybersecurity<\/em>. SECURITY INSIGHTS. https:\/\/www.securityinsights.net\/social-engineering-in-cybersecurity\/&nbsp;<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-8879c076-4f21-4957-812f-a505ffb15ade\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-content\/uploads\/sites\/38494\/2025\/02\/Screenshot-2025-02-05-at-9.38.55-PM-2-1024x574.png\" alt=\"This image has an empty alt attribute; its file name is Screenshot-2025-02-05-at-9.38.55-PM-2-1024x574.png\" \/><\/figure>\n\n\n\n<p id=\"block-040d3c42-358f-4e16-b585-0146edcdccb6\"><em>Beyond the firewall: How social engineers use psychology to compromise organizational cybersecurity<\/em>. Tripwire. https:\/\/www.tripwire.com\/state-of-security\/beyond-firewall-how-social-engineers-use-psychology-compromise-organizational&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-fd0d9e5d-a5fd-4b43-a2a1-b89666273a55\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-content\/uploads\/sites\/38494\/2025\/02\/Screenshot-2025-02-06-at-2.04.15-PM-1024x601.png\" alt=\"This image has an empty alt attribute; its file name is Screenshot-2025-02-06-at-2.04.15-PM-1024x601.png\" \/><\/figure>\n\n\n\n<p id=\"block-8a751670-149c-4720-af16-eaa7004a8395\"><em>Image delivery api<\/em>. contentstack.com. (n.d.). https:\/\/www.contentstack.com\/docs\/developers\/apis\/image-delivery-api&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Home Cybersecurity and the Social Sciences Singh, A. (1970, December 20).&nbsp;Social Engineering in cybersecurity: The evolution of a concept. Global Tech Council. https:\/\/www.globaltechcouncil.org\/cyber-security\/social-engineering-in-cybersecurity-the-evolution-of-a-concept\/&nbsp; Ibreakstock. (2020, June 5).&nbsp;Social science word cloud concept stock illustration &#8211; illustration of Intelligence, global: 185183042. Dreamstime. https:\/\/www.dreamstime.com\/social-science-word-cloud-concept-white-background-image185183042&nbsp; Beyond the firewall: How social engineers use psychology to compromise organizational cybersecurity. Tripwire. https:\/\/www.tripwire.com\/state-of-security\/beyond-firewall-how-social-engineers-use-psychology-compromise-organizational&nbsp;&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":27251,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages\/301"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/users\/27251"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages\/301\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages\/301\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/media?parent=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}