{"id":9,"date":"2026-02-10T01:56:45","date_gmt":"2026-02-10T01:56:45","guid":{"rendered":"https:\/\/student.wp.odu.edu\/kbrax006\/?page_id=9"},"modified":"2026-02-10T01:56:45","modified_gmt":"2026-02-10T01:56:45","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/kbrax006\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/The-Role-of-AI-in-Cybersecurity.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"588\" src=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/The-Role-of-AI-in-Cybersecurity.jpg\" alt=\"\" class=\"wp-image-10\" style=\"width:317px;height:auto\" srcset=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/The-Role-of-AI-in-Cybersecurity.jpg 780w, https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/The-Role-of-AI-in-Cybersecurity-300x226.jpg 300w, https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/The-Role-of-AI-in-Cybersecurity-768x579.jpg 768w, https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/The-Role-of-AI-in-Cybersecurity-600x452.jpg 600w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/a><\/figure>\n\n\n\n<pre class=\"wp-block-preformatted\"><em>Source:<\/em>* Silberg, A. (2023, September 6). <em>The Role of AI in Cybersecurity<\/em>. Cyber Defense Magazine. https:\/\/www.cyberdefensemagazine.com\/the-role-of-ai-in-cybersecurity\/<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/2283-whatiscybersecurity.jpgL_.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"431\" src=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/2283-whatiscybersecurity.jpgL_.jpg\" alt=\"\" class=\"wp-image-11\" style=\"width:430px;height:auto\" srcset=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/2283-whatiscybersecurity.jpgL_.jpg 700w, https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/2283-whatiscybersecurity.jpgL_-300x185.jpg 300w, https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/2283-whatiscybersecurity.jpgL_-600x369.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code><em>Source:<\/em>* Koenig Solutions. (n.d.). <em>Cyber Security - What is it? Importance of Cyber Security<\/em>. Retrieved from https:\/\/www.koenig-solutions.com\/blog\/cyber-security-what-is-it-importance-of-cyber-security<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/f60aad_1346125f71454b84b7b9b1c0eec5e37amv2.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"326\" height=\"218\" src=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/f60aad_1346125f71454b84b7b9b1c0eec5e37amv2.jpeg\" alt=\"\" class=\"wp-image-12\" srcset=\"https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/f60aad_1346125f71454b84b7b9b1c0eec5e37amv2.jpeg 326w, https:\/\/student.wp.odu.edu\/kbrax006\/wp-content\/uploads\/sites\/40713\/2026\/02\/f60aad_1346125f71454b84b7b9b1c0eec5e37amv2-300x201.jpeg 300w\" sizes=\"(max-width: 326px) 100vw, 326px\" \/><\/a><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code><em>Source:<\/em>* Ali, M. A. (n.d.). <em>The Study of Cyber Security: The Legal Perspective and Cyber Ethics<\/em>. Jus Scriptum Law. https:\/\/www.jusscriptumlaw.com\/post\/the-study-of-cyber-security-the-legal-perspective-and-cyber-ethicsintroduction<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Source:* Silberg, A. (2023, September 6). The Role of AI in Cybersecurity. Cyber Defense Magazine. https:\/\/www.cyberdefensemagazine.com\/the-role-of-ai-in-cybersecurity\/<\/p>\n","protected":false},"author":32103,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/pages\/9"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/users\/32103"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/pages\/9\/revisions"}],"predecessor-version":[{"id":13,"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/pages\/9\/revisions\/13"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/kbrax006\/wp-json\/wp\/v2\/media?parent=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}