{"id":6,"date":"2025-09-15T05:33:18","date_gmt":"2025-09-15T05:33:18","guid":{"rendered":"https:\/\/student.wp.odu.edu\/abrow247\/?page_id=6"},"modified":"2025-12-08T04:32:49","modified_gmt":"2025-12-08T04:32:49","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/abrow247\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>These are my journal edits for CYSE201S with what their prompts and my response to them<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Journal Entry 1: <\/strong><\/p>\n\n\n\n<p>Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas are most appealing&nbsp;to you and which are least appealing.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>Reviewing the NICE Workforce Framework, I can find many areas that I would want to<br>focus my career on. From the ones I find to be the most appealing for my career are<br>Defensive Cybersecurity under Protection and Defense, Cybersecurity Architecture under<br>Design and Development and Operational Technology Cybersecurity Engineering. I find<br>these areas the most appealing because they fall in line with my goals of wanting to get<br>into Defensive Security in my career. Defensive Cybersecurity has multiple different areas<br>that will help me analyze data to identify what is safe or unsafe within the network and act<br>upon it. OT Cybersecurity Engineering allows me to progress from taking in the information<br>from utilizing tools into creating and developing the tools themselves to better serve their<br>purpose and improve them over time. Cybersecurity Architecture in my opinion brings it all<br>together to manage and develop the entire organization\u2019s IT Network and Data, taking in<br>the experience and knowledge of analyzing and developing into creating on a larger scale.<\/p>\n\n\n\n<p><strong>Journal Entry 2: <\/strong><\/p>\n\n\n\n<p>How does the principle of empiricism enhance the effectiveness of cybersecurity practices?<\/p>\n\n\n\n<p>Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems.<\/p>\n\n\n\n<p><strong>My Response: <\/strong><\/p>\n\n\n\n<p>Empiricism is the idea that knowledge is derived from the senses, for a lot of cybersecurity<br>most of these senses would be done via sight in the idea of monitoring systems and<br>correctly identifying and distinguishing between a bad actor from a benign system. There is<br>more that can be done from my opinion. For example, security is not always technical and<br>in that would require keeping up with physical security which will require a tactile and<br>observant mindset to be aware of something going wrong in more than just sight but also<br>with touch or rather noticing something irregular with an physical environment.<\/p>\n\n\n\n<p><strong>Journal Entry 3:<\/strong> <\/p>\n\n\n\n<p>Visit&nbsp;<a href=\"https:\/\/privacyrights.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">PrivacyRights.orgLinks to an external site.<\/a>&nbsp;to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches and forecast future data breach trends ? Enter a paragraph in your journal.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>In PrivacyRights.org You\u2019re given a wealth of information in their site as it releases public<br>information about Data breaches. This information becomes invaluable to researchers due<br>to several factors, one of which is when and where new breaches happen, this alone while<br>useful doesn\u2019t mean a lot of information until you also input the company affected and<br>what was used to breach it. This allows in real time to put into what hacking methods are<br>used and need to be defended against while letting consumers know what is going on with<br>a company they may do readily business with. Knowledge of the number of consumers<br>affected can also let in the sheer scale of who is affected which can help with relief in<br>letting consumers know to protect themselves through changing their passwords and<br>information that can be stolen from them. Lastly researchers can utilize this information<br>can help with predicting future incidents where an attacker might strike based on similar<br>systems akin to the ones attacked before and what hacking methods will be employed.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Journal Entry 4:<\/strong> <\/p>\n\n\n\n<p>Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology.<\/p>\n\n\n\n<p>Give specific examples of how your digital experiences relate to each level of need.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> Growing up with computer\/ digital technology has influenced my life greatly ever since I was young, to the point where I hardly remember the time I\u2019ve lived without it as it has sunk into every aspect of my life as well as the lives of many others, this influence even goes into my fundamental needs within the Maslow\u2019s Hierarchy of needs. When I do my shopping online to grab my groceries without wasting money driving there to get Satisfies my Physiological needs. Attached to my door I place a ring camera so that I can know who is at my door and speak to them while in the comfort of my own home fills my safety needs. I fulfill my Belongness and love needs through my friends online who I talk to almost every day to play video games or talk to in general. My Self-esteem I feel as if it doesn\u2019t show itself very much I take pride and a feeling of accomplishment when I learn and do assignments both in my classes and my job which is an example of my esteem needs being met Lastly my Self \u00a0actualization comes from my goals of wanting succeed in the Cybersecurity career and become a Security Architect which I have not completed yet but through technology it has created the goal, will help me achieve it and it influences my enough to make it a goal.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Journal Entry 5<\/strong>: Review the articles linked with each individual motive in slide\/page #3.\u00a0 Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8).\u00a0 Explain why you rank each motive the way you rank it.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> Within cybercrime there are many reasons for someone to commit it despite the legal<br>trouble it may put you through, While they all have their reasons I believe that if there was a<br>ranking of which makes the most sense to the least, the one that makes the most sense is<br>for money due to that being one of the biggest and largest affects of cybercrime and large<br>criminal organizations is due to wanting to make money. Second would come to be<br>political, as given the current landscape political violence and crime being on the sharp<br>rise I can see this as being a very popular motive. Third comes as revenge as an individual<br>motive is very common and can lead to someone doing a crime that hurts someone else.<br>Recognition, and curiosity come as both fourth and fifth mainly due to me thinking they\u2019re<br>of the same kind of idea where someone may want to commit a cybercrime not to harm a<br>system for the idea of their self-interest. Boredom comes to me as second to last as I don\u2019t<br>think it\u2019s reason really stands out more than the other reasons and to me you could lump it<br>in with many others and the one that makes the least sense to me is entertainment as the<br>risk doesn\u2019t really make sense given the motive being for their own amusement.<\/p>\n\n\n\n<p><strong>Journal Entry 6<\/strong>: <\/p>\n\n\n\n<p>Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source].<\/p>\n\n\n\n<p>Compare the three fake websites to three real websites and highlight the features and similarities that identify each fake website as fraudulent.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>Website Spoofing can be a very common and a very dangerous scam, according to a Pew<br>Research Center study \u201c73% of U.S. adults have experienced some kind of online scam or<br>attack.\u201d Mostly this comes from either unawareness of the differences, emotional<br>manipulation through social engineering from creating a sense of urgency or excitement to<br>bypass critical thinking and a desire to be rewarded the easy way. Anyone can fall for these<br>hacks due to these circumstances, so it is always to be willfully prepared for each<br>instance. Take for instance on the site Memcyco paypal.com\/signin vs pay-pail.com with it<br>being obviously misspelled at the pail instead of pal, no sign within the URL nor a \/ to<br>depict a difference in an instance or block from the URL as opposed to pay-pail.com where<br>it continues as one instance. Another example comes from according to Cryptoscam<br>Defense Network where according to them by using domain names that are closely similar<br>to the official DMV site such as dmv-ca-gov.com compared to the real site dmv.ca.gov<br>where the fake site attempts to mask it from being a .gov site but still having a .com site,<br>having dashes instead of periods being another example of it\u2019s fraudulence. Lastly it is a<br>fake website from Aura that shows a very seamless yet important change of Walmart.com<br>vs WaImart.com which shows that the fake website is using a capital \u201ci\u201d instead of a lower<br>case \u201cl\u201d that comes to using a different domain on such a small but obvious changes that<br>can make that can make a difference in such attacks.<br>Works Cited<br>Arad, Ran. \u201c5 Recent Examples of Fake Websites.\u201d Memcyco, 11 Sept. 2024,<br>www.memcyco.com\/5-recent-examples-of-fake-websites\/.<br>Gottfried, Jeffrey, et al. \u201cOnline Scams and Attacks in America Today.\u201d Pew Research<br>Center, Pew Research Center, 31 July 2025,<br>www.pewresearch.org\/internet\/2025\/07\/31\/online-scams-and-attacks-in-america-today\/.<br>Sanja, Hunt. \u201c5 Fake Website Examples with Real-World Consequences.\u201d Crypto Scam<br>Defense Network, 6 June 2025, cryptoscamdefensenetwork.com\/fake-website-examples\/.<br>Toohil, Ryan. \u201cHow to Identify Fake Websites: 11 Warning Signs to Know.\u201d Edited by Alina<br>Benny, Aura, Aura, 15 Jan. 2025, www.aura.com\/learn\/how-to-identify-fake-websites.<\/p>\n\n\n\n<p><strong>Journal Entry 7:<\/strong> <\/p>\n\n\n\n<p>Review the following photos through a human-centered cybersecurity framework.\u00a0<strong>Create a meme for your favorite three<\/strong>, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"617\" src=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image.png\" alt=\"\" class=\"wp-image-23\" srcset=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image.png 975w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-300x190.png 300w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-768x486.png 768w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-600x380.png 600w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-945x598.png 945w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Meme: <\/strong>POV: An Employee clicked on a phishing email <\/p>\n\n\n\n<p><strong>Explanation:<\/strong> Phishing scams are the most common forms of hacking that can occur and when an organization is hacked it will eventually go into a lessons learned meeting with all the employees in a not so good situation that occurred due to human error.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"650\" src=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1.png\" alt=\"\" class=\"wp-image-24\" srcset=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1.png 975w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1-300x200.png 300w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1-768x512.png 768w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1-600x400.png 600w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-1-945x630.png 945w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Meme:<\/strong> Guy to the right: Hey man you typed in your password wrong.<\/p>\n\n\n\n<p>Guy to the left: Thanks man- HEY WAIT HOW DO YOU KNOW!?-<\/p>\n\n\n\n<p><strong>Explanation:<\/strong> The guy on the right has been shoulder surfing their coworker for a while to the point where they\u2019ve memorized their password. This can be very dangerous as if a bad actor gets to shoulder surf it can lead to them being hacked.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"549\" src=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2.png\" alt=\"\" class=\"wp-image-25\" srcset=\"https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2.png 975w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2-300x169.png 300w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2-768x432.png 768w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2-600x338.png 600w, https:\/\/student.wp.odu.edu\/abrow247\/wp-content\/uploads\/sites\/39659\/2025\/12\/image-2-945x532.png 945w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Meme:<\/strong> At our organization We have the best security tool money can buy!<\/p>\n\n\n\n<p>The Security tool:<\/p>\n\n\n\n<p><strong>Explanation:<\/strong> Having a VPN while it can be helpful shouldn\u2019t be the only security tool you have in an organization and it doesn&#8217;t guarantee 100% coverage of security.<\/p>\n\n\n\n<p><strong>Journal Entry 10:<\/strong> <\/p>\n\n\n\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831Links to an external site.<\/a><\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>Within this article, it addresses what it would take to address the protection of sensitive<br>data within the digital landscape from various cybercrimes through a social perspective. It<br>goes into the importance of detecting these social cyber related threats in a timely manner<br>to prevent as much harm as possible. One method is accessing the potential of public<br>datasets and tools that can help enhance this search for these crimes to further research<br>around the behavior and how to prevent it in the future. By going about it\u2019s points the<br>article discusses the definition of social cybersecurity, its modern and historical<br>developments and how Social Cybersecurity is different from regular cybersecurity and it\u2019s<br>value in learning it.<\/p>\n\n\n\n<p><strong>Journal Entry 11:<\/strong> <\/p>\n\n\n\n<p>Watch this\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">videoLinks to an external site.<\/a>.\u00a0 As you watch the video<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an external site.<\/a><\/p>\n\n\n\n<p>, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>The Description of being a Cybersecurity Analyst relates greatly to many social behaviors<br>with many themes. One of which is the location in which a person might best be suited to<br>living in when pursuing a career, talking about certain locations being more affordable yet<br>less money vs more money with a higher cost of living. She also talked about the<br>competition within certain areas in pursuing a career as a cybersecurity analyst in a city<br>with a lot of college graduates will cause higher amounts of competition within those<br>candidates. The speaker also talked about the salary and the Job outlook in being what<br>employers were looking for and how much they\u2019d pay.<\/p>\n\n\n\n<p><strong>Journal Entry 12:<\/strong> Read this\u00a0<a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.<\/a>\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different psychological social sciences theories relate to the letter.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>Within the Data Breach described by the Company Grasswaterparts Many economic<br>theories and psychological social sciences theories relate to this example of notification<br>for a data breach. The couple I feel relate to this situation the most are Classical and<br>Laissez-Faire economic theories and Cognitive and Reinforcement Sensitivity Theory. My<br>reasoning for these theories is that for Cognitive it matches as from the description of the<br>intrusion it is that the perpetrators of the incident had great focus and perception in taking<br>select information from the third party that would benefit them. That benefit also comes to<br>reasoning behind why this incident also falls under the Reinforcement Sensitivity Theory as<br>the criminals went for the fastest and most reward driven goals being that of getting<br>names, credit and debit card numbers that would lead to that goal. For Economic theories<br>my reasoning for choosing Classical is that from this incident it is between the businesses<br>and the perpetrators with no government involvement shown and Laissez-Faire due to the<br>company responding to it\u2019s incident according and addressing it to their customers. <\/p>\n\n\n\n<p><strong>Journal Entry 13:<\/strong> A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>From this article I can see a great value in implementing bug bounties within the<br>Cybersecurity space as a mainstream policy, maybe not as a single fix all but a part of<br>every evolving chain within the industry. They\u2019d serve as a way for the defenders to look at<br>the errors within the code or exploit them from the perspective that someone working on<br>the code form the inside might not be aware of immediately. It gives hints at where an<br>attacker might be planning to strike in the future and it serves as a way to adapt to those<br>situations before an malicious attacker can exploit that weakness, lastly it can allow for<br>the company to have a vast amount of people searching for errors without having to<br>constantly paying them out to every one of them unless they find a bounty in question.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Journal Entry 14:<\/strong> <a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy\u00a0Links to an external site.SlynchukLinks to an external site.\u00a0Links to an external site.<\/a>has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/p>\n\n\n\n<p><strong>My Response:<\/strong>  <\/p>\n\n\n\n<p>Andriy Slynchuk talks about 11 things that people do Online, some of which<br>are less obvious than others, Of the 5 I believe that are the most serious<br>violations are Collecting Information about children, Sharing Passwords,<br>addresses, or photos of others, recording a VoIP call without consent, Illegal<br>Searches on the internet, and Bullying and Trolling. My reasoning why<br>they\u2019re the most serious violations come from the fact that some of these<br>illegal things come from the access or misuse of certain kinds of information<br>that could lead to something illegal, Like for sharing passwords, addresses,<br>or photos of others, recording a VoIP call without consent, Illegal Searches<br>on the internet and collecting information about children, or affect<br>someone\u2019s mental and emotional state like in Bullying and Trolling but they<br>all have the effect of viewing or accessing data or information that can be<br>illegal or be misused for illegal purposes.<\/p>\n\n\n\n<p><strong>Journal Entry 15:<\/strong> <\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=YWGZ12ohMJU\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Side of AI &#8211; How Hackers use AI &amp; Deepfakes | Mark T. Hofmann |Links to an external site.<\/a>&nbsp;<\/strong><strong>TEDxAristide<\/strong><strong><a href=\"https:\/\/www.youtube.com\/watch?v=YWGZ12ohMJU\" target=\"_blank\" rel=\"noreferrer noopener\">Links to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=YWGZ12ohMJU\"><\/a><\/strong><strong>Demetriade<\/strong><strong>&nbsp;Street<\/strong><\/p>\n\n\n\n<p>Watch this video and describe, What ethical questions did the presentation raise for you? How do you think society should address these ethical concerns?<\/p>\n\n\n\n<p><strong>My Response:<\/strong> <\/p>\n\n\n\n<p>In the Dark Side of AI How Hackers use AI &amp; Deepfakes, Mark T. Hofmann talks about the<br>dangers of AI and Deepfakes in the way that it can manipulate the truth for people who are<br>completely unaware to cause harm to themselves and others. Discussing how it can<br>manipulate the masses by stating something is true when it is not, altering faces and<br>voices to make people do things that a normal person didn\u2019t do. He talks about how people<br>need to be aware of these tools and adapt around them while Cybersecurity professionals<br>will be excited on how things will change.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These are my journal edits for CYSE201S with what their prompts and my response to them Journal Entry 1: Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas are&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/abrow247\/journal-entries\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31437,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/6"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/users\/31437"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":27,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/6\/revisions\/27"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}