{"id":304,"date":"2026-01-24T02:00:55","date_gmt":"2026-01-24T02:00:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/taddi004\/?page_id=304"},"modified":"2026-02-06T01:41:17","modified_gmt":"2026-02-06T01:41:17","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/taddi004\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Cybersecurity &amp; Social Sciences<\/h2>\n\n\n\n<p>Cybersecurity isn\u2019t just about firewalls and code. it\u2019s deeply connected to human behavior, communication, and societal trends. In this course, I\u2019ve learned that understanding how people think, interact, and make decisions online is just as important as technical defenses. Social science helps us see patterns in trust, risk perception, misinformation, social engineering, and policy impacts that shape cybersecurity outcomes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Infographic: Cybersecurity &amp; Human Factors<\/h3>\n\n\n\n<p>This infographic highlights how cybersecurity practitioners must consider human behavior and common attack methods (like social engineering)  a core theme in sociotechnical approaches to security.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-2 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime-622x1024.png\" alt=\"\" class=\"wp-image-331\" style=\"width:245px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime-622x1024.png 622w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime-182x300.png 182w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime-768x1265.png 768w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime-933x1536.png 933w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime-1243x2048.png 1243w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/rising-threat-in-cybersecurity-crime.png 1700w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1-791x1024.jpg\" alt=\"\" class=\"wp-image-332\" style=\"width:305px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1-791x1024.jpg 791w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1-232x300.jpg 232w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1-768x994.jpg 768w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1-1187x1536.jpg 1187w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1-1583x2048.jpg 1583w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/NIST_Cybersecurity-Infographic_Downloadable-8.5x11_FINAL-1-1.jpg 1700w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/figure>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/cybersecurity_infographic_f_f_c4abd0c4-868d-47a1-9023-3bb9b5847cba-791x1024.jpg\" alt=\"\" class=\"wp-image-335\" style=\"width:308px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/cybersecurity_infographic_f_f_c4abd0c4-868d-47a1-9023-3bb9b5847cba-791x1024.jpg 791w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/cybersecurity_infographic_f_f_c4abd0c4-868d-47a1-9023-3bb9b5847cba-232x300.jpg 232w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/cybersecurity_infographic_f_f_c4abd0c4-868d-47a1-9023-3bb9b5847cba-768x994.jpg 768w, https:\/\/sites.wp.odu.edu\/taddi004\/wp-content\/uploads\/sites\/39823\/2026\/02\/cybersecurity_infographic_f_f_c4abd0c4-868d-47a1-9023-3bb9b5847cba.jpg 800w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/figure>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Reflection<\/h2>\n\n\n\n<p>These visuals remind me that cybersecurity is a sociotechnical problem not just machines vs. machines. People are often the weakest link <em>and<\/em> the first line of defense. Understanding how attackers exploit trust, habits, and social platforms helps explain <em>why<\/em> cybersecurity solutions must include awareness, education, and behavior change strategies (a core lesson of CYSE 201S)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity &amp; Social Sciences Cybersecurity isn\u2019t just about firewalls and code. it\u2019s deeply connected to human behavior, communication, and societal trends. In this course, I\u2019ve learned that understanding how people think, interact, and make decisions online is just as important as technical defenses. Social science helps us see patterns in trust, risk perception, misinformation, social&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/taddi004\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":31514,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/pages\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/users\/31514"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/pages\/304\/revisions\/336"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/taddi004\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}