{"id":120,"date":"2025-09-19T00:54:33","date_gmt":"2025-09-19T00:54:33","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2026-03-29T21:27:02","modified_gmt":"2026-03-29T21:27:02","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nross008\/","title":{"rendered":"Home"},"content":{"rendered":"\n<p>Hello and welcome to my e-Portfolio.  With this e-Portfolio I hope to share the experiences I&#8217;ve had with Cybersecurity and the growth, I&#8217;m looking to continue growing in Cybersecurity and hopefully get my foot into real world experiences within the field.  Below you will find some pictures and some thoughts I have regarding cybersecurity and the social sciences.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Coding-background-Cyber-1024x536.jpg\" alt=\"\" class=\"wp-image-315\" style=\"width:390px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Coding-background-Cyber-1024x536.jpg 1024w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Coding-background-Cyber-300x157.jpg 300w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Coding-background-Cyber-768x402.jpg 768w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Coding-background-Cyber-573x300.jpg 573w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Coding-background-Cyber.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">This picture here represents cybersecurity.  Cybersecurity is a growing profession that needs trained professionals because of the rising dangers of cyber attacks.  These cyber attacks can lead to large financial loss to organizations along with confidential data that belongs to clients of these organizations.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/HackerCriminology-1024x535.jpg\" alt=\"\" class=\"wp-image-316\" style=\"width:397px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/HackerCriminology-1024x535.jpg 1024w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/HackerCriminology-300x157.jpg 300w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/HackerCriminology-768x401.jpg 768w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/HackerCriminology-574x300.jpg 574w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/HackerCriminology.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">This picture represents criminology in terms of cybersecurity.  Cyber crime is a growing issue within the cybersecurity community.  With cyber crime being able to be committed from anywhere on the globe, it raises big concerns for governments and security professionals on how to properly tackle the issue.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"244\" src=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/EconomicsCyber.jpg\" alt=\"\" class=\"wp-image-317\" style=\"width:398px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/EconomicsCyber.jpg 680w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/EconomicsCyber-300x108.jpg 300w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/EconomicsCyber-600x215.jpg 600w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><figcaption class=\"wp-element-caption\">Economics is another field that is influenced by cybersecurity.  The importance of making sure systems are properly secured to protect important data regarding business operations, financial data, and client data are ever more important with this data be stored online.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"672\" src=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber-1024x672.jpg\" alt=\"\" class=\"wp-image-318\" style=\"width:393px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber-1024x672.jpg 1024w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber-300x197.jpg 300w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber-768x504.jpg 768w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber-1536x1008.jpg 1536w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber-457x300.jpg 457w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/PoliticalScienceCyber.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">A social science that is important to cybersecurity is political science.  Political science is important because governments making sure that federal guidelines and regulations are put in place for organizations to follow.  This allows for federal guidelines to be put in place for organizations to make sure that their confidential data are properly secured.  This also helps put in place proper incident guidelines and federal intervention are in proper place.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"405\" src=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Ransomware2.jpg\" alt=\"\" class=\"wp-image-319\" style=\"width:392px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Ransomware2.jpg 720w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Ransomware2-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2025\/09\/Ransomware2-533x300.jpg 533w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><figcaption class=\"wp-element-caption\">Ransomware is a growing concern because it locks data in the hopes of individuals paying a price to unlock their systems.  These kind of attacks can cost a company millions as they can choose to pay the ransom or lose the data.  This increases the concern of having proper cyber security practices in place to prevent and mitigate the damages of ransomware.<\/figcaption><\/figure>\n\n\n\n<p>Sources:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.morganstanley.com\/articles\/cybersecurity-terms-guide\">https:\/\/www.morganstanley.com\/articles\/cybersecurity-terms-guide<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.skillcast.com\/blog\/ways-improve-cybersecurity\">https:\/\/www.skillcast.com\/blog\/ways-improve-cybersecurity<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/arts-sciences.buffalo.edu\/economics\/about\/what-is-economics.html\">https:\/\/arts-sciences.buffalo.edu\/economics\/about\/what-is-economics.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bitsight.com\/blog\/top-7-ransomware-attack-vectors-and-how-avoid-becoming-victim\">https:\/\/www.bitsight.com\/blog\/top-7-ransomware-attack-vectors-and-how-avoid-becoming-victim<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-voegelinview wp-block-embed-voegelinview\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"BEyAf3xa1l\"><a href=\"https:\/\/voegelinview.com\/introduction-to-political-science-concepts-methods-and-topics\/\">Introduction to Political Science: Concepts, Methods, and Topics<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Introduction to Political Science: Concepts, Methods, and Topics&#8221; &#8212; VoegelinView\" src=\"https:\/\/voegelinview.com\/introduction-to-political-science-concepts-methods-and-topics\/embed\/#?secret=Tk4ZgtVIsA#?secret=BEyAf3xa1l\" data-secret=\"BEyAf3xa1l\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/voegelinview.com\/introduction-to-political-science-concepts-methods-and-topics\/\">https:\/\/voegelinview.com\/introduction-to-political-science-concepts-methods-and-topics\/<\/a><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Hello and welcome to my e-Portfolio. With this e-Portfolio I hope to share the experiences I&#8217;ve had with Cybersecurity and the growth, I&#8217;m looking to continue growing in Cybersecurity and hopefully get my foot into real world experiences within the field. Below you will find some pictures and some thoughts I have regarding cybersecurity and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nross008\/\">Read More<\/a><\/div>\n","protected":false},"author":31330,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/users\/31330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages\/120\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}