{"id":6,"date":"2026-02-10T20:02:34","date_gmt":"2026-02-10T20:02:34","guid":{"rendered":"https:\/\/student.wp.odu.edu\/kscot047\/?page_id=6"},"modified":"2026-02-10T20:16:46","modified_gmt":"2026-02-10T20:16:46","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/kscot047\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img decoding=\"async\" src=\"https:\/\/th.bing.com\/th\/id\/OIP.i4TIQs-OiLBXG0aTtbKcXQAAAA?w=203&amp;h=271&amp;c=7&amp;r=0&amp;o=7&amp;pid=1.7&amp;rm=3\" alt=\"\" style=\"width:286px;height:auto\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\">CYSE 201S Page<br>CYSE 201S: Introduction to Cybersecurity and the Social Sciences<br>The social sciences, policies, ethics, behavior of humans and how they affect cyber security issues will be explored in this class. This course will help you understand the way that both technical defenses and people can impact the outcome of a security issue.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/tse2.mm.bing.net\/th\/id\/OIP.RyP2mfQnaIJ3URFiE-4sXwHaEC?w=474&amp;h=379&amp;c=7&amp;p=0\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/tse4.mm.bing.net\/th\/id\/OIP.j1l7WayiinkrRX2LkzfQSgHaDp?w=474&amp;h=379&amp;c=7&amp;p=0\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/tse1.mm.bing.net\/th\/id\/OIP.6RXAggtMj3lrKF9gfGvLhQHaEJ?w=474&amp;h=379&amp;c=7&amp;p=0\" alt=\"\" \/><\/figure>\n\n\n\n<ul>\n<li><em>Social engineering workflow<\/em> \u2014 Source: Xiph Cyber (visual showing attack steps).<\/li>\n\n\n\n<li><em>Social engineering word cloud and icons<\/em> \u2014 Source: OSINT Team article on human element in cybersecurity.<\/li>\n\n\n\n<li><em>Social engineering attacks graphic<\/em> \u2014 Source: Hideez blog on social engineering threats.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 201S PageCYSE 201S: Introduction to Cybersecurity and the Social SciencesThe social sciences, policies, ethics, behavior of humans and how they affect cyber security issues will be explored in this class. This course will help you understand the way that both technical defenses and people can impact the outcome of a security issue.<\/p>\n","protected":false},"author":32114,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/pages\/6"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/users\/32114"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":13,"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/pages\/6\/revisions\/13"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/kscot047\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}