{"id":6,"date":"2024-12-08T23:23:35","date_gmt":"2024-12-08T23:23:35","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ghamp001\/?p=6"},"modified":"2024-12-08T23:23:35","modified_gmt":"2024-12-08T23:23:35","slug":"final-eportfolio","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/ghamp001\/2024\/12\/08\/final-eportfolio\/","title":{"rendered":"Final ePortfolio"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">All About me<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"1024\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-576x1024.jpg\" alt=\"\" class=\"wp-image-7\" style=\"width:194px;height:auto\" srcset=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-576x1024.jpg 576w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-169x300.jpg 169w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-768x1365.jpg 768w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-864x1536.jpg 864w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-1152x2048.jpg 1152w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-600x1067.jpg 600w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876-945x1680.jpg 945w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/IMG_3876.jpg 1242w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/a><\/figure>\n\n\n\n<p>My name is Gabriella Hampton. This is my Sophomore year at Old Dominion University, and I am a Cybersecurity major. I came to school to major in Civil Engineering and then ended up being in Electrical Engineering and I loved it. I did engineering all through high school so, it was hard to decide to which majors. However, I still love cyber and I might stay with this major. Because I&#8217;m in college now I don&#8217;t do anything but stay in my room. Don&#8217;t have any hobbies anymore, but I love to read and watch YouTube to keep my peace to be happy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Journal Entries 1-15<\/strong><\/h2>\n\n\n\n<p>1.) I want to be either a Digital forensic examiner or a Special Agent for my career. As a digital forensic examiner, I\u2019ll use software and advanced technology to analyze and preserve digital evidence from FBI investigations. A work area I&#8217;ll need is Digital Evidence Analysis which is responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques. Special agents often are FBI employees who fight all types of crime and acts of terrorism, including cyber threats and crimes. Some duties might include tracking a criminal&#8217;s online activity and investigating potential cyber instructions. The work area I will need is Cybercrime Investigation which is responsible for investigating incidents and crimes. I&#8217;ll need to know the tactics, techniques, and procedures for all the investigative tools and processes. However, I believe the least work area I\u2019ll need is Cyberspace effects or Cyberspace Operations which are responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. I believe that no work area would appeal the least in the fields because just the basic knowledge in all work\u00a0areas could still be valuable as you progress in either career.\u00a0<\/p>\n\n\n\n<p>2.)The Old Dominion website states that &#8216;In studying cybersecurity as a social science, we must always adhere to the scientific principles of\u00a0relativism, objectivity, parsimony, ethical neutrality, and determinism.&#8217; Therefore, science principles are observing, experimenting, and hypothesizing tests, that contain cybersecurity. In cybersecurity, professionals use scientific methods to analyze and minimize threats. Observation is when they monitor network traffic and identify anomalies. The hypothesis is investigating the cause of cyber incidents along with experimenting through simulations or testing security measures. Then, data analysis and pattern recognition came with scientific methodology in helping to understand unstable behaviors and predict future attacks. However, by applying these principles, cybersecurity professionals create an effective, evidence-based defense and adapt quickly to solving threats.<\/p>\n\n\n\n<p>3.)Researchers use data on breaches to analyze patterns and trends in cyberattacks, that help them identify vulnerabilities in systems and common methods used by attackers. By studying breach reports, including the type of data compromised, attack vectors, and the industries targeted, researchers can uncover weaknesses or technological gaps that need improvement. This information allows researchers to develop more effective prevention techniques and strategies, such as improving encryption protocols or enhancing cybersecurity policies. Additionally, studying the timeline of breaches, including detection and response times, helps in refining incident response strategies and minimizing damage from future attacks. By compiling and analyzing breach data, researchers contribute to developing a more resilient cybersecurity infrastructure across various sectors.<\/p>\n\n\n\n<p>4.)Maslow\u2019s Hierarchy needs to connect with technology in various ways in my life. For physiological needs, I use technology for basics like online grocery shopping with having to put my card information on the app and using my health apps with my medical records. Security needs are met through cybersecurity tools like two-factor authentication. Social media platforms like Instagram and messaging apps belong by keeping me connected with friends. Respect is shown by professional achievements shared on platforms like LinkedIn. Finally, self-actualization is facilitated through online learning tools, coding platforms, and creativity apps, where I seek personal growth and my abilities in the programming field.<\/p>\n\n\n\n<p>5.) -Political\/Ideological Motives (Hacktivism)- Reasoning: Hacktivism is driven by strong beliefs or the desire to promote social or political change. This motive makes the most sense in the context of cybercrime, as individuals or groups often feel morally justified in their actions, whether they&#8217;re protesting injustice, censorship, or corruption.\u00a0<\/p>\n\n\n\n<p>-Financial Gain- Reasoning: Many cybercriminals are primarily motivated by monetary rewards, which is a simple and relatable incentive. Whether through scams, ransomware, or data theft, financial motives often have a clear and tangible goal. The HP research revealed that cybercriminals spend their ill-gotten gains on items ranging from luxury goods.\u00a0<\/p>\n\n\n\n<p>-Revenge\/Personal Grudges- Reasoning: Cybercrimes motivated by revenge make sense on a more emotional level, especially when personal relationships or emotional connections are involved. Revenge porn cases, where perpetrators seek to humiliate or harm their victims, reflect this personal motive.\u00a0<\/p>\n\n\n\n<p>-Thrill\/Challenge- Reasoning: Many hackers, especially younger individuals, are motivated by the thrill or challenge of hacking into systems. The intellectual stimulation of breaking into protected systems can be rewarding, as illustrated by the stories of youthful hackers joining the hacktivism movement.\u00a0<\/p>\n\n\n\n<p>-Reputation or Notoriety- Reasoning: Gaining notoriety or establishing a name within hacker communities is another motivation that makes sense but is perhaps less practical. Hackers might target high-profile companies to gain fame or respect in underground circles.\u00a0<\/p>\n\n\n\n<p>-Data Scraping for Professional Purposes- Reasoning: Data scraping from platforms like LinkedIn can be motivated by professional advantages, such as creating databases or leveraging personal information for business purposes. While it makes sense for data scraping to be motivated by the desire to gain business advantages, it is less emotionally driven than other forms of cybercrime, which is why it ranks lower.<\/p>\n\n\n\n<p>-Grooming\/Exploitation- Reasoning: While online grooming and exploitation of children is a severe and pressing issue, the motivation behind it is less understandable and relatable from a general perspective. It is often driven by deeply disturbed psychological conditions, making it harder to rank higher on this list of logical motives.<\/p>\n\n\n\n<p>In conclusion, while all these motives exist within the theme of cybercrime, like political, financial, or revenge are more logical or relatable, to others like grooming may be less so due to their disturbing nature.<\/p>\n\n\n\n<p>6.) -www.bank0famerica.com \u2013 This is a phishing website that imitates the official Bank of America site but uses a zero (&#8220;0&#8221;) instead of an &#8220;O&#8221;. It aims to steal login credentials or personal information.<br>\u00a0 \u00a0<br>-www.amaznshopdeals.com \u2013 This site pretends to offer Amazon deals but is not an official Amazon domain. Fake deals and suspicious links could lead to malware or data theft.<\/p>\n\n\n\n<p>-www.tech-support-now.net \u2013 A fraudulent tech support site designed to scam users by offering fake services and asking for remote access or payment for &#8220;repairs&#8221; that aren&#8217;t needed.<\/p>\n\n\n\n<p>These websites can be identified as fake based on suspicious domain names, spelling errors, and unusual requests for personal information or payments. Always verify the authenticity of a website before entering sensitive information.<\/p>\n\n\n\n<p>8.)The media significantly shapes public understanding of cybersecurity, often portraying it exaggeratedly or overly simplistic. After watching the video &#8220;Hacker Rates 12 Hacking Scenes In Movies And TV,&#8221; it becomes clear that many depictions of hacking are dramatized for entertainment. Rapid typing, flashy graphics, and unrealistic timeframes create the illusion that hacking is quick and straightforward. Hacking is complex, requiring specialized knowledge, patience, and meticulous effort. These fictional portrayals can lead to misconceptions, such as underestimating the importance of cybersecurity measures or believing in the &#8220;lone genius hacker&#8221; stereotype. Such media depictions often ignore cybersecurity&#8217;s collaborative and defensive aspects, potentially giving audiences a false sense of both the ease and the threat of hacking. Ultimately, the media\u2019s portrayal shapes perceptions, influencing how seriously people take cybersecurity in their personal and professional lives.<\/p>\n\n\n\n<p>9.) <\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/Screenshot-2024-12-08-180531.png\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"743\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/Screenshot-2024-12-08-180531.png\" alt=\"\" class=\"wp-image-8\" style=\"width:258px;height:auto\" srcset=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/Screenshot-2024-12-08-180531.png 801w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/Screenshot-2024-12-08-180531-300x278.png 300w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/Screenshot-2024-12-08-180531-768x712.png 768w, https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/uploads\/sites\/37121\/2024\/12\/Screenshot-2024-12-08-180531-600x557.png 600w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/a><\/figure>\n\n\n\n<p>10.) The article on social cybersecurity for the U.S. Army, particularly discusses the idea of using social strategies to counter cyber threats, particularly how enemies exploit social networks and online influence to manipulate public opinion and destabilize societies. It explains that cybersecurity isn&#8217;t just technical; it also involves protecting social structures from cyber-driven manipulation and misinformation movements. This approach merges traditional cybersecurity with social science, stressing the need for collective resilience, awareness, and proactive measures to safeguard national security. I found it convincing, as it widens cybersecurity\u2019s scope to include social elements, suggesting a shift toward more combined defense strategies in digital spaces. Overall, it stresses the critical nature of securing military networks and data to maintain operational readiness and effectiveness against adversaries.<\/p>\n\n\n\n<p>11.) The role of a cybersecurity analyst, as described in the video, emphasizes social behaviors like vigilance, adaptability, and teamwork. Analysts must navigate a collaborative environment to protect sensitive information, which builds a culture of trust and shared responsibility. They also handle constant interaction with other team members and stakeholders, reinforcing the social theme of collective security efforts. Additionally, there is an underlying theme of ethical responsibility, as analysts must make decisions that prioritize both privacy and safety, showcasing how cybersecurity intertwines with social trust and moral accountability.<\/p>\n\n\n\n<p>12.) Economic Theories<\/p>\n\n\n\n<p>1. Agency Theory: This theory focuses on the relationship between a principal and an agent who is responsible for acting in the principal&#8217;s best interest. In this context, customers trust the company to protect their personal information. Still, the data breach shows a failure in this agency relationship, highlighting potential issues of information asymmetry and the cost of safeguarding customer data. The breach undermines trust and may lead to costs for the company as they address regulatory scrutiny, compensates affected customers, and implement better security measures.<\/p>\n\n\n\n<p>2. Behavioral Economics: This theory can help explain customer responses and company actions post-breach. Behavioral economics suggests that people may act irrationally in the face of security threats, either by overestimating the risk or by feeling resigned to the potential risks of using digital services. The notification letter, which includes assurances about mitigating actions and monitoring, attempts to reduce customer anxiety and restore trust by appealing to these psychological responses, aiming to manage customer perceptions and mitigate future financial repercussions from the breach.<\/p>\n\n\n\n<p>Social Science Theories<\/p>\n\n\n\n<p>1. Social Trust Theory: Social trust theory considers how people\u2019s trust in institutions impacts social cohesion and cooperation. Data breaches harm social trust as customers feel betrayed by companies meant to protect their sensitive data. In this breach letter, the company&#8217;s response aims to rebuild trust by demonstrating transparency, outlining specific actions, and ensuring accountability. Without such efforts, customers may lose faith in the company and, more broadly, in digital platforms.<\/p>\n\n\n\n<p>2. Social Learning Theory: This theory suggests that individuals learn behaviors and responses from observing others. In the case of a data breach, customers observe how the company handles the incident and may learn to respond with caution or even skepticism towards similar institutions. This letter serves as a signal to customers and other businesses on how to handle breaches responsibly, potentially influencing industry standards and customer expectations around data security practices and crisis responses.<\/p>\n\n\n\n<p>In sum, these theories highlight the complicated dynamics that play in data breaches, affecting both customer trust and company strategies for crisis management and future prevention.<\/p>\n\n\n\n<p>13.) The article &#8220;Bug Bounty Programs as a Tool for Cybersecurity&#8221; explains the use and impact of bug bounty policies in cybersecurity, focusing on how they allow ethical hackers to identify and report system vulnerabilities. The authors discuss the development of bug bounty programs (BBPs) and their growing importance in organizational security strategies. They highlight that, from an economic perspective, BBPs align well with cost-benefit principles: companies can potentially save on the costs associated with breaches by paying ethical hackers relatively small rewards for identifying vulnerabilities before malicious actors do. BBPs also democratize security testing by enabling a wide range of skilled hackers, with different expertise levels, to participate in strengthening a company&#8217;s defenses. The study reveals a complex set of motivations among participants. While financial reward is a key factor, it is not the sole motivator; many hackers participate in BBPs for professional development, skill enhancement, and community recognition. This demonstrates the importance of non-monetary incentives in fostering engagement. The findings also address challenges in BBPs, such as the need for well-structured policies that clearly outline scope, acceptable methods, and reward structures. Poorly defined policies can lead to confusion, reduced effectiveness, and even legal issues. In reaction, the study effectively illustrates the value of BBPs as a mutually beneficial policy: organizations gain insights into their security weaknesses at a lower cost, while ethical hackers build skills and reputation. However, it also suggests that the success of such programs depends heavily on transparent communication and well-defined parameters. Without these, the risk of misunderstandings and ethical concerns rises, potentially compromising the program&#8217;s effectiveness. This approach to cybersecurity policy through an economic and social framework demonstrates the importance of considering both the financial incentives and the community dynamics involved in BBPs.<\/p>\n\n\n\n<p>14.) Andriy Slynchuk outlines several potentially illegal online activities, highlighting serious violations that can lead to severe consequences. Among these, five stand out for their impact on individual privacy, security, and societal norms:<\/p>\n\n\n\n<p>-Using or Distributing Pirated Content: This activity violates copyright laws and undermines creators and businesses by distributing unauthorized copies of media or software. The economic damage to industries and the potential for malware in pirated files make this a critical issue.<\/p>\n\n\n\n<p>-Hacking or Unauthorized Access: Gaining unauthorized access to computers, networks, or accounts is a federal crime under laws like the Computer Fraud and Abuse Act. This poses risks to personal data, corporate security, and national safety.<\/p>\n\n\n\n<p>-Spreading Malware or Spyware: Creating or distributing software designed to harm devices or steal sensitive information violates laws and can cause significant financial and personal harm to victims.<\/p>\n\n\n\n<p>-Identity Theft: Stealing and using someone else\u2019s identity for personal gain severely violates privacy and trust. It often results in financial loss and long-lasting impacts on the victim\u2019s credit and reputation.<\/p>\n\n\n\n<p>-Unauthorized Monitoring or Tracking: Installing spyware to monitor individuals without consent is illegal in many jurisdictions, especially for adults, and breaches privacy laws such as the Wiretap Act.<\/p>\n\n\n\n<p>These violations are serious because they infringe on individual rights, cause financial damage, and contribute to a broader erosion of trust and security in the digital space. Legal frameworks exist to deter these actions, but their prevalence underscores the need for awareness and ethical online behavior.<\/p>\n\n\n\n<p>15.) After watching Davin Teo\u2019s TEDx talk, I was intrigued by his journey into digital forensics and how it intersects with the social sciences. Teo explains the human element in solving cyber crimes, where understanding behavior is as crucial as technical expertise. His passion for uncovering digital evidence shows the psychological and sociological aspects of the work, such as interpreting motives or piecing together actions. I found his emphasis on storytelling within investigations compelling, as it mirrors the social sciences\u2019 focus on narratives to understand human behavior. Teo\u2019s career pathway shows that blending technical skills with an understanding of society creates a powerful tool for justice, reinforcing my interest in this field.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Articles<\/strong> 1 &amp; 2<\/h2>\n\n\n\n<p><strong>1.) Article #1 Cyberbullying and Cyberbullicide Ideation<\/strong><br> Among Jordanian College Students<br>The article investigates the intersection of technology and criminal behavior. Along with<br>addressing social science principles such as human behavior, law enforcement<br>responses, and the impact of societal shifts on criminal patterns. By examining how<br>digital criminal investigations are influenced by AI, it directly ties into criminology and<br>sociology, which study how societal factors shape and control deviance.<br>The central research questions revolve around understanding how AI technologies can<br>improve digital criminal investigations and what legal frameworks are necessary to<br>balance technological advancements with ethical concerns. The hypothesis suggests<br>that the integration of AI will lead to more efficient, accurate, and proactive criminal<br>investigations.<br> The study uses a qualitative, descriptive, and analytical approach, relying on legal<br>documents, case studies, and scholarly literature to provide an understanding view of<br>AI&#8217;s role in criminal investigations. This approach allows for an exploration of both the<br>technical and legal measures of the topic.<br>The analysis includes qualitative data drawn from legal frameworks, criminal case<br>studies, and AI applications in law enforcement. It also utilizes machine learning<br>techniques to organize and interpret case data, demonstrating how AI can streamline<br>case management, predict criminal behavior, and improve decision-making processes.<br>I don\u2019t fully believe this matches the PowerPoint presentation because the PowerPoint<br>focus was the victim&#8217;s personality and psychological traits. While this article&#8217;s focus was<br>cybercrime, digital forensics, and the role of AI in law enforcement. This article directly<br>ties into themes like predictive policing and automated surveillance, which might have<br>been highlighted in your presentations, and are central to the article&#8217;s exploration of AI&#8217;s<br>potential in identifying criminal patterns and reducing recidivism.<br>AI\u2019s integration into law enforcement can raise concerns about bias and the<br>marginalization of some groups. There is a risk that algorithmic biases could<br>disproportionately affect certain populations, as AI systems often reflect the biases<br>present in the data they are trained with. This is a major challenge to ensure that the<br>use of AI in criminal justice is fair and equitable.<br>The study Contributions to Society emphasizes the potential for AI to contribute to<br>more efficient, more effective criminal justice processes, such as improving identity<br>verification and preventing criminal activities through predictive analytics. However, it<br>also cautions that proper legal safeguards must be established to prevent the misuse of<br>AI in ways that could harm individuals&#8217; rights or privacy.<br>In conclusion, the article makes a significant contribution to discussions on how AI<br>technologies can transform digital criminal investigations while highlighting the legal and<br>ethical concerns that must be addressed to ensure a balanced approach.<br>Recourses<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/329\/<br>98<\/p>\n\n\n\n<p><strong>2.) Article #2: Factors Influencing the Formation of Intellectual<\/strong><br>Security among University Students<br>The article analyzes intellectual security among university students, linking it to the<br>social sciences by analyzing how societal, cultural, and educational factors shape their<br>perceptions. &#8220;Factors Influencing the Formation of Intellectual Security among<br>University Students&#8221; addresses research questions on influences fostering intellectual<br>security and employ field studies with surveys for data collection.<br>The topic of educated security among university students with social science principles<br>examines the difference between individual behaviors and cultural influences. It<br>addresses how societal norms, education systems, and communication dynamics<br>influence educational development and critical thinking. By exploring these factors, the<br>study combines psychological, sociological, and historical perspectives, encouraging an<br>understanding of how environments shape thought decision-making, which are major<br>pieces in the social sciences. The study&#8217;s research questions or hypotheses likely focus<br>on understanding the factors that influence the development of educated security<br>among university students. This includes examining how societal, educational, and<br>technological environments shape students&#8217; abilities to evaluate information critically,<br>withstand educated manipulation, and foster strength against cyber threats. The<br>research also explores the role of university systems and peer interactions in improving<br>education security.<br>Data collection involves surveys or interviews with university students to gather insights<br>into their education security. Statistical analysis is used to identify correlations between<br>various social, educational, and psychological factors. Quantitative and qualitative data,<br>including survey responses and possibly interviews with university students. The<br>quantitative data is analyzed to identify relationships between educational<br>environments, societal influences, and intellectual resilience. Qualitative data provides<br>deeper insights into students\u2019 perceptions and experiences. This mixed method ensures<br>a complete understanding of the factors influencing intellectual security.<br>Concepts from PowerPoint presentations on the social sciences, such as the impact of<br>societal structures, individual behavior, and group dynamics, relate closely to the<br>article&#8217;s examination of personal security. The article addresses how education and<br>socialization shape critical thinking and resilience like social learning, and the influence<br>of cultural factors. These principles help explain the difference between the societal<br>environment and students&#8217; educated security. The topic of educational security among<br>university students directly relates to the challenges, concerns, and contributions of<br>minority groups. The groups often face systemic obstacles making it limited access to educational resources and digital literacy tools, which can interfere with their ability to<br>develop intellectual security.<br>The study contributes to society by emphasizing the importance of education and<br>security among university students. It highlights how different educational, societal, and<br>technological shape students&#8217; ability to know the information. By promoting awareness<br>of these influences, the study encourages strategies to strengthen educated resilience,<br>ensuring that students, particularly those from minority groups, are better prepared to<br>navigate challenges like misinformation and cyber threats. This research helps<br>encourage a more informed and secure society.<br>In conclusion, the study on education security among university students highlights the<br>important role of education, societal influences, and technological factors in fostering<br>critical thinking and resilience. By addressing the challenges of minority groups and<br>promoting inclusive strategies, the research provides valuable insights into improving<br>intellectual<br>Reference<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/344\/<br>100<\/p>\n\n\n\n<p><\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/ghamp001\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>All About me My name is Gabriella Hampton. This is my Sophomore year at Old Dominion University, and I am a Cybersecurity major. I came to school to major in Civil Engineering and then ended up being in Electrical Engineering&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/ghamp001\/2024\/12\/08\/final-eportfolio\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29725,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/posts\/6"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/users\/29725"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/posts\/6\/revisions"}],"predecessor-version":[{"id":9,"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/posts\/6\/revisions\/9"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/media?parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/categories?post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ghamp001\/wp-json\/wp\/v2\/tags?post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}