{"id":133,"date":"2023-01-13T02:20:48","date_gmt":"2023-01-13T02:20:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2023-04-24T02:45:26","modified_gmt":"2023-04-24T02:45:26","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nflor010\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Journal Entry #1<\/h2>\n\n\n\n<p>I remember growing up, watching action movies where the hacker would sit down behind the laptop and try to break a firewall so the action star could stylishly escape. I also remember in Sci-Fi movies where the hacker would save the day by hacking the deadly, futuristic robots from destroying our world. Those films pretty much sum up the world of Cybersecurity to me. In my own words, Cybersecurity is much more than hacking, it is a combination of many things and many fields. It is strongly rooted in Computer Science, Information Technology, and Engineering because they are all in the technological sphere and they all require the brains of a problem solver; However, one thing that sets Cybersecurity apart from those other fields would be its connection to us as a society. In the modern world, everyone is connected to technology, which means that everyone is at risk to be hacked. Cybersecurity tackles this threat head-on. Every company nowadays is a tech company. In order for a business to succeed, it must have a presence online. Businesses are in much need of Cybersecurity people to protect them from having their data breached. As you can see, Cybersecurity is needed everywhere. That is why I chose this as my major because it takes the best parts of every major and combines them into this special super major. There are principles of business, implications of computer science, morals of psychology, and so much more all wrapped up in this major. Everyone needs someone with expert knowledge of security in the technological world, and Cybersecurity fills that hole. Fortunately for me, this major is in high demand, and there are many high-salary careers that involve Cybersecurity. This field is constantly evolving, and I am ready and excited to learn more. Plus, I already had a strong interest in computers and how they operate, so this is right up my alley. I am already familiar with the computer language of Python, and I am always learning new things that are happening in the Tech World.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #2<\/h2>\n\n\n\n<p>Q:&nbsp;<strong>Select four other majors offered by ODU and explain how those majors relate to cybersecurity.<\/strong><\/p>\n\n\n\n<p>A: 1) Information Technology- Cybersecurity and Information Technology (IT) are closely related. IT deals with the use of technology to manage and process information, while Cybersecurity focuses on protecting that technology and the information it contains from unauthorized access. This means that IT professionals are responsible for building and maintaining the computer systems and networks that store and process data, while cybersecurity professionals are responsible for protecting those systems and networks from cyber threats such as hacking, malware, and phishing attacks.<\/p>\n\n\n\n<p>2) Computer Science- While computer science focuses on the development of technology, cybersecurity focuses on the protection of that technology. Computer scientists may design and develop software and hardware systems, while cybersecurity professionals work to secure those systems. In a nutshell, computer science is the foundation and cybersecurity is the application of security and safety measures on top of that foundation. Many computer scientists work in the field of cybersecurity, using their knowledge of computer systems to design and implement secure systems and to detect and respond to cyber threats. Additionally, advances in computer science have led to the development of new cybersecurity tools and techniques.<\/p>\n\n\n\n<p>3) Sociology- Sociology is the study of human behavior and social systems. One way in which the two fields are related is through the study of the social implications of technology. As technology continues to permeate every aspect of our lives, sociologists study how it affects individuals and society as a whole. Sociologists also study the digital divide, which refers to the unequal distribution of access to technology and the Internet. This is a crucial issue in cybersecurity, as people without access to technology are more vulnerable to cyber-attacks.4) Criminology- Both fields intersect when it comes to cybercrime, which refers to criminal activity that involves the use of computer systems and networks. Cybercriminals may use a variety of techniques to commit crimes such as hacking into computer systems to steal sensitive information. criminologists and cybersecurity experts often work together to investigate and prevent crime. Criminologists may use their understanding of criminal behavior to help identify potential cybercriminals, while cybersecurity experts may use their technical expertise to track down and prosecute cybercriminals. Together, they can develop strategies to combat crime in both the physical and digital worlds.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #3<\/h2>\n\n\n\n<p>Q:&nbsp;<strong>&nbsp;Describe four ethical issues that arise when storing electronic information about individuals.<\/strong><\/p>\n\n\n\n<p>A: Privacy: Privacy is the first ethical issue that arises when storing electronic information about individuals. It refers to the protection of personal information from unauthorized access. When personal information is collected and stored electronically, there is a risk that it may be accessed by unauthorized parties, such as hackers or companies that collect data for targeted advertising. Additionally, the stored data can be used for surveillance, and this can be used to track and monitor individuals without their knowledge or consent.<\/p>\n\n\n\n<p>Security: Security is the second ethical issue that arises when storing electronic information about individuals. It refers to the protection of personal information from data breaches and hacking. When personal information is stored electronically, there is a risk that it may be accessed by unauthorized parties, such as hackers or malicious actors. This can lead to sensitive information being exposed or stolen, which can have serious consequences for individuals, such as identity theft or financial fraud. Additionally, the exposure of sensitive information, such as a patient&#8217;s medical record or a company&#8217;s trade secret, can also lead to serious consequences.<\/p>\n\n\n\n<p>Discrimination: Electronic information storage can also be used to discriminate against certain individuals based on their personal characteristics. Discrimination is one of the ethical issues that arise when storing electronic information about individuals. It refers to the potential for automated systems to perpetuate discrimination based on personal characteristics such as race, gender, age, sexual orientation, and so on. Data ownership: When individuals&#8217; personal information is collected, it is often not clear who owns the data or how it will be used. For example, companies may collect personal information from customers and then use it for targeted advertising or sell it to third-party companies without the individual&#8217;s knowledge or consent. Additionally, governments or other organizations may collect personal information without providing individuals with any control over how it is used, which can lead to a loss of autonomy and privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #4<\/h2>\n\n\n\n<p><strong>Q: Compare cybersecurity risks in the U.S. and another country.<\/strong><\/p>\n\n\n\n<p>A:  Here are some of the most common cybersecurity attacks in the United States in recent years. Number one would be Ransom Attacks. These attacks involve the use of malicious software to encrypt someone&#8217;s files. Recently, ransomware has become a very common type of attack in the United States. Another common type of security risk would be phishing. This type of risk tricks people into revealing their login information by the use of spam emails or a fake website that looks identical to the legitimate ones. In the United States, phishing attacks have been a significant problem, particularly in the financial services and healthcare sectors. Many countries around the world are affected by cyber-attacks.  Some countries that have been known to be targeted by cyber attacks would be China, Russia, Iran, and North Korea. <\/p>\n\n\n\n<p>Today, I will be focusing on Russia. In 2016, Russian hackers were accused of numerous cyber attacks against the Democratic National Committee and other targets associated with the Clinton campaign. The hackers are believed to have stolen sensitive emails and other documents. This was a very concerning time during the election. Every media outlet known to man was talking about Hillary Clinton&#8217;s email controversy.  Russian disinformation campaigns also played a role in shaping public opinion. Basically, their goal was to influence the outcome of the election. Russian trolls and bots on social media were found to be spreading false information and propaganda in an effort to support Donald Trump and undermine Hillary Clinton.  The cyber-attacks and disinformation campaigns that influenced the outcome of the election remain to be a touchy topic, but it is clear that they were a significant factor in the election and have had a lasting impact on U.S. politics and the broader global political landscape. The incident has caused a lot of attention to the threat of cyber attacks both in the U.S. and around the world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #5<\/h2>\n\n\n\n<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.&nbsp;<\/p>\n\n\n\n<p>C: Cybersecurity merchandise<\/p>\n\n\n\n<p>Y: Youtube videos that are about cybersecurity <\/p>\n\n\n\n<p>B: Bug Bounty Programs<\/p>\n\n\n\n<p>E: Educational videos <\/p>\n\n\n\n<p>R: Research<\/p>\n\n\n\n<p>S: Software<\/p>\n\n\n\n<p>E: Ethical Hacking<\/p>\n\n\n\n<p>C: Cryptography <\/p>\n\n\n\n<p>U: University professor of cybersecurity <\/p>\n\n\n\n<p>R: Restaurant that is cybersecurity themed <\/p>\n\n\n\n<p>I: Information Technology Specialist <\/p>\n\n\n\n<p>T: Telemarketer <\/p>\n\n\n\n<p>Y: Yacht GPS app that is secure<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #6<\/h2>\n\n\n\n<p><strong>Q:<\/strong> <strong>How has cyber technology created opportunities for workplace deviance?<\/strong><\/p>\n\n\n\n<p>A: <\/p>\n\n\n\n<p>Cyber technology revolutionized the way we work and interact with each other in the workplace. While it has brought numerous benefits, it has also created new opportunities for deviance, as employees can use digital tools to engage in unethical or illegal activities. Cyber technology has made it easier for employees to steal or damage company data, such as confidential documents, financial records, or customer information. This can be done through hacking, phishing, or other forms of cybercrime. Cyberbullying and harassment online are other types of workplace deviance that come from cyber technology. This can include sending offensive messages, spreading rumors or gossip, or posting derogatory comments on social media. Cyberbullying and harassment can have a significant impact on the mental health and well-being of employees, as well as on team dynamics. Personally, I experienced this firsthand. One day I was playing online with my friends. Then suddenly, a random person started acting very aggressively toward me because I wasn&#8217;t doing so well in the game. He even went to the extreme by cursing at me and using racial slurs. <\/p>\n\n\n\n<p>The cyber field is always evolving. People can do so many things to cause workplace deviance. There are ways to slow down these crimes, such examples include: not letting workers bring in their own personal computers and laptops. This could allow them to access things they are not supposed to. Overall cyber technology has created more ways for workplace deviance to occur and has also made it easier to do and makes it harder to get caught. Workplace deviance will always occur in all types of work but cyber technology makes it easier to execute. The cyber field is always evolving. People can do so many things to cause workplace deviance. There are ways to slow down these crimes, such examples include: not letting workers bring in their own personal computers and laptops. This could allow them to access things they are not supposed to. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #7<\/h2>\n\n\n\n<p>Q: <strong>What are the costs and benefits of developing cybersecurity programs in business?<\/strong><\/p>\n\n\n\n<p>A: There are many costs and benefits to developing cybersecurity programs in businesses. A benefit would be the protection of sensitive data. A cybersecurity program can implement protection from unauthorized access. It can also prevent any cyber-attacks. These cyber-attacks can be devasting for a business. It can lead to a significant loss in money, and legal liability, and can damage the business&#8217;s reputation. Another benefit of cybersecurity programs would be Compliance. Some businesses are required by law to implement cybersecurity programs to comply with regulations such as HIPAA, PCI DSS, or GDPR. Lastly, Cybersecurity programs can give the business an advantage. Businesses that have robust cybersecurity programs can gain a competitive advantage by building customer trust and confidence. <\/p>\n\n\n\n<p>However, with all these benefits, they come with a cost. One example would be how much money it would take. A business sees this program as an investment. Developing and implementing a comprehensive cybersecurity program can be expensive. The cost depends on the size of the organization, the level of protection required, and the complexity of the systems and networks. Another cost would be the ongoing maintenance. Cybersecurity programs always require maintenance, upgrades, and other updates. It is vital that the program stays up to date so it can not be easily hacked. Sometimes, maintenance can be very difficult and requires a certain individual who is knowledgeable in that subject. Nowadays, it is hard finding a person with that skill set, and if you do, they come with a price. Another huge cost would be the training of staff and employees. These individuals must be taught how to identify, prevent, and respond to any type of cyber attack. The cost of training can be very pricy. <\/p>\n\n\n\n<p>Overall, the benefits of developing a cybersecurity program far outweigh the costs. In today&#8217;s digital age, cybersecurity is essential for all businesses to protect their data, reputation, and financial health. While implementing a cybersecurity program may involve some costs, the potential benefits are significant and can help protect a business&#8217;s financial well-being and reputation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #8<\/h2>\n\n\n\n<p>Q: <strong>&nbsp;How can you tell if your computer is safe?<\/strong><\/p>\n\n\n\n<p>A: Ensuring that your computer is safe and secure is crucial in protecting your sensitive data and personal information. Make sure you have an updated antivirus program and a firewall enabled on your computer. These programs can help prevent and detect malicious attacks. Another way to tell if your computer is safe is to make sure that your computer&#8217;s operating system and software are up-to-date with the latest security patches and updates. These updates often include important security fixes which will be very important. Two-factor authentication is an added security measure. Make sure to use this feature whenever you have a chance. It is a good habit to try and stay away from pop-up ads. These can slow the performance of your computer and can lead to installing a virus. A huge tip to ensure that your computer stays safe would be to install Malwarebytes. It is a program that scans your computer for unwanted threats. It is a good tool for keeping your laptop secure and fast. It&#8217;s important to have updated antivirus and anti-malware software installed on your computer to help protect against these threats. Additionally, be cautious when opening email attachments or downloading files from untrusted sources to avoid inadvertently installing malware on your computer. Backing up your files and data is another good habit. Backing up is useful if your computer has been compromised because it can restore your data. A good tip for staying safe would be to check for HTTPS in the website address. This shows that the connection is secure between your computer and the website. Also, it is important to use reputable software. Only download and install software from reliable sources, and avoid downloading software from untrusted websites. By following all these tips, you can ensure that your computer will be safe. If you think that your computer has been breached, seek professional help from a cybersecurity expert. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #9<\/h2>\n\n\n\n<p>Q: <strong>Describe three ways that computers have made the world safer and less safe.<\/strong> <\/p>\n\n\n\n<p>   Computers have revolutionized the way we live our lives and interact with the world around us. They have brought tremendous advancements and made our lives easier in many ways, but they have also created new challenges and risks. In this essay, I will describe three ways that computers have made the world safer and less safe.<\/p>\n\n\n\n<p>   Firstly, computers have made the world safer by enhancing security measures. With the increasing use of computers, security has become a critical concern. To address this issue, computers have been used to create more sophisticated security systems, including biometric identification systems, facial recognition software, and other advanced technologies. These security measures have made it more difficult for criminals to carry out their activities, and have made our society safer. Secondly, computers have made the world safer by improving emergency response systems. With the advent of computers, emergency response systems have become more efficient and effective. For example, GPS technology has made it easier for emergency services to locate and rescue people in need. Additionally, computerized dispatch systems have enabled first responders to quickly and accurately identify the location of emergencies and dispatch the appropriate resources to the scene.<\/p>\n\n\n\n<p>   However, computers have also made the world less safe in some ways. One significant concern is the increasing prevalence of cybercrime. As more and more sensitive information is stored on computers and transmitted over the internet, the risk of cyber-attacks has grown. Cybercriminals can steal personal information, financial data, and even intellectual property, causing significant damage to individuals and businesses alike. Another way that computers have made the world less safe is through the proliferation of fake news and misinformation. Social media and other online platforms have made it easy for false information to spread quickly and widely. This has led to widespread confusion and mistrust, which can undermine social cohesion and even threaten public safety.<\/p>\n\n\n\n<p>In conclusion, computers have had a significant impact on our society, both positive and negative. They have enhanced security measures and emergency response systems, but they have also created new risks and challenges. As we continue to rely on computers in more aspects of our lives, it is essential to be aware of both their benefits and their limitations and to take steps to mitigate their potential risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #10<\/h2>\n\n\n\n<p>Q: <strong>How do engineers make cyber networks safer?<\/strong><\/p>\n\n\n\n<p>Cybersecurity is an important concern in today&#8217;s digital age. With the increasing number of cyberattacks and cyber threats, it has become crucial for engineers to make cyber networks safer. In this essay, we will explore how engineers make cyber networks safer. Firstly, engineers implement robust security protocols in cyber networks to make them safer. They use encryption techniques, such as SSL\/TLS, to secure the data transmission over the network. These protocols use mathematical algorithms to scramble the data, making it unintelligible to anyone who intercepts it. Additionally, engineers use firewalls to prevent unauthorized access to the network. Firewalls are hardware or software-based security systems that filter incoming and outgoing network traffic based on predefined security rules. They block any traffic that is not compliant with the security rules, thereby securing the network. Secondly, engineers ensure the security of software applications and firmware that run on cyber networks. They conduct rigorous testing and vulnerability assessments to identify potential security flaws in software and firmware. Once identified, they patch the vulnerabilities with software updates, ensuring that the network is secure against potential cyber threats. Thirdly, engineers implement multi-factor authentication to secure access to cyber networks. Multi-factor authentication requires users to provide more than one type of authentication factor to access the network, such as a password and a biometric identifier. This makes it harder for hackers to gain unauthorized access to the network. Lastly, engineers implement intrusion detection and prevention systems to monitor the network for any unauthorized access or malicious activity. These systems use advanced algorithms to detect anomalous behavior on the network, such as port scanning or unauthorized access attempts. Once detected, the system alerts the engineers to take appropriate action to prevent any potential cyber threats. In conclusion, engineers play a critical role in making cyber networks safer. They implement robust security protocols, ensure the security of software applications and firmware, implement multi-factor authentication, and use intrusion detection and prevention systems to secure the network. By implementing these measures, engineers can help prevent cyber threats and ensure that cyber networks remain safe and secure.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #11<\/h2>\n\n\n\n<p>There are many overlaps between criminal justice and cybercrime. The Internet and the use of technology are rapidly increasing. With this in mind, cybercrime has become a major threat. They target anyone such as small businesses, large businesses, and governments. The Criminal Justice System has been around much longer than the Internet. With Cybercrimes becoming more of a threat, The Criminal Justice System had to adapt in order to prevent this type of crime. Cybercrime and criminal justice go hand in hand. In some cases, hacking has caused some dramatic changes to the Criminal Justice System. Nowadays, Law enforcement agencies must have the technical expertise to identify criminals in the digital realm. They also need to gather evidence that can be used in court to prosecute cybercriminals. This requires a deep understanding of how computer networks work, as well as an understanding of the different types of hacking and tools that cybercriminals use. Technology has advanced so quickly that the Criminal Justice System had to adjust and advance just to keep up.<\/p>\n\n\n\n<p>Another area of overlap is in the legal framework that applies to cybercrime. Many countries have passed laws that specifically target cybercrime and provide harsher penalties for those convicted of cyber-related offenses. These laws can cover a wide range of activities, from hacking and malware distribution to identity theft and online fraud. Criminal justice systems need to be familiar with these laws and how to apply them to different types of cybercrime.<\/p>\n\n\n\n<p>These two topics relate to other disciplines that we learned so far in this class. An example would be SCADA, which stands for Supervisory control and data acquisition. If companies implement these security protocols in their business, cybercrimes will decrease. Another topic that we talked about would be the different types of Cyber Threats.&nbsp;These threats come in various forms such as hacking, malicious code, and phishing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #12<\/h2>\n\n\n\n<p>Q: <strong>How does cyber technology impact interactions between offenders and victims?<\/strong><\/p>\n\n\n\n<p>A: <\/p>\n\n\n\n<p>As we continue to rely more and more on cyber technology in our daily lives, it&#8217;s become increasingly clear that it&#8217;s had a significant impact on the way offenders and victims interact. From my perspective, it&#8217;s clear that cyber technology has made it easier for offenders to target victims, and it&#8217;s changed the nature of their interactions in ways that can make it harder for victims to identify and report the crime. One of the most striking things about cybercrime is the anonymity it affords. Offenders can use the internet to identify and target potential victims without ever revealing their identities, which makes it much harder for law enforcement to track them down. This anonymity also allows offenders to manipulate and exploit victims through deception and coercion, leading to long-term emotional and psychological harm. Another significant impact of cyber technology on interactions between offenders and victims is that it&#8217;s changed the nature of their interactions. In traditional forms of crime, offenders, and victims usually interacted face-to-face. However, in cybercrime, offenders and victims can interact remotely, without ever having to meet in person. This can make it much harder for victims to identify the offender and can make it more difficult for law enforcement to investigate and prosecute the offender. However, I also recognize that cyber technology has provided victims with new resources and support networks. Victims of cybercrime can use the internet to connect with support groups, seek counseling, and access other resources. The internet can also be used to report crimes and provide evidence to law enforcement, which can be particularly important given the remote nature of cybercrime. In conclusion, as someone who uses cyber technology every day, I&#8217;m aware of the significant impact it has on interactions between offenders and victims. While it&#8217;s made it easier for offenders to target victims and remain anonymous, it&#8217;s also provided victims with new resources and support networks. We must continue to adapt to these changes and find new ways to prevent and address cybercrime. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #13<\/h2>\n\n\n\n<p>Q: <strong>How should we approach the development of cyber-policy and -infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/strong><\/p>\n\n\n\n<p>A: <\/p>\n\n\n\n<p>The development of cyber policy and infrastructure requires careful consideration of numerous factors, including technological advancements, the evolving nature of cyber threats, and the need to balance security with privacy and individual rights. However, the inherent complexity and unpredictability of the digital landscape can make it difficult to predict and prevent cyber incidents. This has been referred to as the &#8220;short arm&#8221; of predictive knowledge in the context of cybersecurity. To address this challenge, policymakers and cybersecurity professionals must adopt a proactive and agile approach to cyber-policy and infrastructure development. This can involve leveraging the latest technologies and strategies to detect and respond to threats in real-time, as well as investing in robust education and training programs to equip individuals with the skills and knowledge necessary to navigate the digital landscape. One key strategy for developing effective cyber-policy and infrastructure is to prioritize collaboration and information-sharing between stakeholders. This can involve partnering with technology companies, academic institutions, and government agencies to stay up-to-date on emerging threats and best practices. Additionally, policymakers and cybersecurity professionals should engage with the public to raise awareness about cyber threats and educate individuals on how to be safe during their time online. Another important consideration when developing cyber-policy and infrastructure is the need to balance security with individual privacy and rights. This can involve implementing measures such as encryption and data protection regulations, while also ensuring that individuals have access to their own personal data and the ability to control how it is used. Overall, the development of cyber-policy and infrastructure requires a multifaceted approach that takes into account the dynamic and constantly evolving nature of the digital landscape. By adopting a proactive and collaborative approach, policymakers and cybersecurity professionals can work together to mitigate cyber threats and create a safer and more secure online environment for all.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry #1 I remember growing up, watching action movies where the hacker would sit down behind the laptop and try to break a firewall so the action star could stylishly escape. I also remember in Sci-Fi movies where the&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/nflor010\/it-cyse-200t-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25862,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/users\/25862"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/pages\/133\/revisions\/386"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}