{"id":4,"date":"2025-02-01T20:36:08","date_gmt":"2025-02-01T20:36:08","guid":{"rendered":"https:\/\/student.wp.odu.edu\/jwill297\/?page_id=4"},"modified":"2025-02-03T04:21:36","modified_gmt":"2025-02-03T04:21:36","slug":"home-page","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/jwill297\/","title":{"rendered":"Home Page"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"min-height:196px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img decoding=\"async\" class=\"wp-block-cover__image-background\" alt=\"\" src=\"https:\/\/www.cisa.gov\/sites\/default\/files\/styles\/hero_large\/public\/2022-12\/HERO_AbstractCyber4_0.jpg?h=e0d9a4bb&amp;itok=Yw3OtF2k\" data-object-fit=\"cover\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><strong>Cyber Security<\/strong><\/p>\n\n\n\n<p>Hello, my name is John Chandler Williams. This is my portfolio showcasing my journey and activities in cybersecurity. Thank you for taking an interest\u2014I hope you enjoy exploring my work!<\/p>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"360\" src=\"https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/img-Federal-cybersecurity-image-iStock-1420039900-1000-360-c-C-97.jpg\" alt=\"\" class=\"wp-image-12\" srcset=\"https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/img-Federal-cybersecurity-image-iStock-1420039900-1000-360-c-C-97.jpg 1000w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/img-Federal-cybersecurity-image-iStock-1420039900-1000-360-c-C-97-300x108.jpg 300w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/img-Federal-cybersecurity-image-iStock-1420039900-1000-360-c-C-97-768x276.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\"><strong>Image 2<\/strong><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><a href=\"https:\/\/www.qnbtrust.bank\/Resources\/Learning-Center\/Blog\/7-cyber-security-tips\"><img decoding=\"async\" src=\"https:\/\/www.qnbtrust.bank\/Portals\/0\/EasyDNNNews\/545\/images\/img-Cyber-Security-Blog-Image-821-491-c-C-97.png\" alt=\"\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Image 3<\/strong><\/figcaption><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-cybersecurity\"><img loading=\"lazy\" decoding=\"async\" width=\"997\" height=\"593\" src=\"https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/types-of-cybersecurity.png\" alt=\"\" class=\"wp-image-19\" srcset=\"https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/types-of-cybersecurity.png 997w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/types-of-cybersecurity-300x178.png 300w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/types-of-cybersecurity-768x457.png 768w\" sizes=\"(max-width: 997px) 100vw, 997px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Image 4<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p><br><br><br><br><br><br><br><br><br><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><a href=\"https:\/\/netgaincloud.com\/cybersecurity-awareness-month-staying-secure-in-the-modern-digital-world\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/Graphic-Cybersecurity-Awareness-Month-scaled-1-1024x583.jpg\" alt=\"\" class=\"wp-image-21\" srcset=\"https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/Graphic-Cybersecurity-Awareness-Month-scaled-1-1024x583.jpg 1024w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/Graphic-Cybersecurity-Awareness-Month-scaled-1-300x171.jpg 300w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/Graphic-Cybersecurity-Awareness-Month-scaled-1-768x437.jpg 768w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/Graphic-Cybersecurity-Awareness-Month-scaled-1-1536x875.jpg 1536w, https:\/\/student.wp.odu.edu\/jwill297\/wp-content\/uploads\/sites\/38374\/2025\/02\/Graphic-Cybersecurity-Awareness-Month-scaled-1-2048x1166.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Image 5<\/strong><\/figcaption><\/figure>\n\n\n\n<p><strong>Sources:<\/strong><br><br><br><strong>First Image<\/strong><br> <strong>Cybersecurity and Infrastructure Security Agency.<\/strong> &#8220;Cybersecurity Best Practices.&#8221; <em>CISA<\/em>, U.S. Department of Homeland Security, <a href=\"https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\">https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices<\/a>. Accessed 1 February 2025.<br><br><strong>Second Image<\/strong><br><strong>American Health Information Management Association.<\/strong> &#8220;Federal Cybersecurity Efforts Seek to Improve Protection of Health Data.&#8221; <em>Journal of AHIMA<\/em>, <a href=\"https:\/\/journal.ahima.org\/page\/federal-cybersecurity-efforts-seek-to-improve-protection-of-health-data\">https:\/\/journal.ahima.org\/page\/federal-cybersecurity-efforts-seek-to-improve-protection-of-health-data<\/a>. Accessed 1 February 2025.<br><br><strong>Third Image<\/strong><br><strong>Queensborough National Bank &amp; Trust.<\/strong> &#8220;7 Cyber Security Tips.&#8221; <em>Queensborough National Bank &amp; Trust<\/em>, <a href=\"https:\/\/www.qnbtrust.bank\/Resources\/Learning-Center\/Blog\/7-cyber-security-tips\">https:\/\/www.qnbtrust.bank\/Resources\/Learning-Center\/Blog\/7-cyber-security-tips<\/a>. Accessed 1 February 2025.<br><br><strong>Fourth Image<\/strong><br><strong>Fortinet.<\/strong> &#8220;What is Cybersecurity.&#8221; <em>Fortinet<\/em>, <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-cybersecurity\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-cybersecurity<\/a>. Accessed 1 February 2025.<br><br><strong>Fifth image<\/strong><br><strong>Netgain.<\/strong> &#8220;Cybersecurity Awareness Month: Staying Secure in the Modern Digital World.&#8221; <em>Netgain<\/em>, <a href=\"https:\/\/netgaincloud.com\/cybersecurity-awareness-month-staying-secure-in-the-modern-digital-world\/\">https:\/\/netgaincloud.com\/cybersecurity-awareness-month-staying-secure-in-the-modern-digital-world\/<\/a>. Accessed 1 February 2025.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sources: First Image Cybersecurity and Infrastructure Security Agency. &#8220;Cybersecurity Best Practices.&#8221; CISA, U.S. Department of Homeland Security, https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices. Accessed 1 February 2025. Second ImageAmerican Health Information Management Association. &#8220;Federal Cybersecurity <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/jwill297\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30488,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages\/4"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/users\/30488"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages\/4\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}