{"id":432,"date":"2024-11-03T11:40:00","date_gmt":"2024-11-03T16:40:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaroncominio\/?p=432"},"modified":"2024-11-05T11:11:04","modified_gmt":"2024-11-05T16:11:04","slug":"journal-entry-week-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/03\/journal-entry-week-10\/","title":{"rendered":"Week 10: Journal Entry 10"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Social Cybersecurity: Guarding Against Modern Information Warfare<\/h2>\n\n\n\n<div class=\"wp-block-cover aligncenter\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"737\" class=\"wp-block-cover__image-background wp-image-434\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k-1024x737.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k-1024x737.jpg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k-300x216.jpg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k-768x553.jpg 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k-1536x1106.jpg 1536w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k-417x300.jpg 417w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/39896085555_c10dfa41b7_k.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-right has-cyan-bluish-gray-color has-text-color has-link-color wp-elements-bb19b0bb0b0dd84f2fe1d05a94def9b2\"><sup><a href=\"https:\/\/www.flickr.com\/photos\/airmanmagazine\/39896085555\" data-type=\"link\" data-id=\"https:\/\/www.flickr.com\/photos\/airmanmagazine\/39896085555\">Airman Magazine<\/a><\/sup><\/p>\n\n\n\n<p>The article &#8220;<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\" data-type=\"link\" data-id=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\">Social Cybersecurity: An Emerging National Security Requirement<\/a>,&#8221; written by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley, demonstrates how \u201csocial cybersecurity\u201d is a national security threat. Today\u2019s connected technologies eliminate the need for physical proximity to influence society. Bad actors use the decentralized information flow to manipulate beliefs and ideas at a low cost around the world. Current cyber threats use race, religion, and distrust of government institutions to create hostility in societies. For example, Russia\u2019s use of \u201cinformation blitzkrieg,\u201d a cyber take on the physical blitzkrieg used in WW II, is used to sow distrust in societies.<\/p>\n\n\n\n<p>Information warfare has become a primary and unrelenting way to attack nation-states. Society has significantly changed with 24 access to social media. Misinformation and disinformation are rampant, exacerbated by news outlets focused on being first rather than being correct. Social cybersecurity training should be incorporated into our early education systems. Ensuring our technologically adapted civilization is updated with the knowledge to protect itself from cyber warfare is essential.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Cybersecurity: Guarding Against Modern Information Warfare Airman Magazine The article &#8220;Social Cybersecurity: An Emerging National Security Requirement,&#8221; written by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley, demonstrates how \u201csocial cybersecurity\u201d is a national security threat. Today\u2019s connected technologies eliminate the need for physical proximity to influence society. Bad actors use the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/03\/journal-entry-week-10\/\">Read More<\/a><\/div>\n","protected":false},"author":29612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/432"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/users\/29612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/432\/revisions"}],"predecessor-version":[{"id":442,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/432\/revisions\/442"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/media?parent=432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/categories?post=432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/tags?post=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}