{"id":377,"date":"2025-12-05T16:21:36","date_gmt":"2025-12-05T16:21:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/?page_id=377"},"modified":"2025-12-05T17:48:06","modified_gmt":"2025-12-05T17:48:06","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<ul><\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-layout-1 wp-block-post-template-is-layout-grid\"><li class=\"wp-block-post post-419 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/12\/05\/cyse-201s-presentation\/\" target=\"_self\" >CYSE 201S Presentation<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cybersecurity in Healthcare: Protecting Patient Data and Public Health <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-12-05T18:38:18+00:00\">December 5, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-347 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/14\/cyse-201-journal-entry-14-top-five-internet-violations-and-why-they-matter\/\" target=\"_self\" >CYSE 201: Journal Entry 14: Top Five Internet Violations and Why They Matter<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">After reading \u201c11 Illegal Things You Unknowingly Do on the Internet\u201d by Andriy Slynchuk, I reflected on which actions pose the greatest risks to individuals and society. Some violations are minor, but others can lead to serious harm or legal consequences. In my view, these five stand out as the most concerning because of their&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-11-14T01:37:36+00:00\">November 14, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-344 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/09\/cyse-201-journal-entry-13-bug-bounty-policies\/\" target=\"_self\" >CYSE 201: Journal Entry 13: Bug Bounty Policies<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">This article breaks down how bug bounty programs work and why they matter. From the literature review, it\u2019s clear that these policies are built around cost-benefit thinking. Instead of hiring full-time security teams to find every vulnerability, companies open up their systems to ethical hackers who get paid when they find something useful. This approach&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-11-09T00:40:31+00:00\">November 9, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-342 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/09\/cyse-201-journal-entry-12-economic-and-psychological-theory-connections-to-data-breach-example\/\" target=\"_self\" >CYSE 201: Journal Entry 12: Economic and Psychological Theory Connections to Data Breach Example<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Even though this is just a sample breach letter, it still shows how real cybersecurity situations connect to both economics and psychology. From the economics side, the rational choice theory fits the attackers. They didn\u2019t just randomly hit a system. They chose a platform that gave them access to customer payment data over a long&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-11-09T00:27:03+00:00\">November 9, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-340 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/02\/cyse-201-journal-entry-11-video-review-what-does-a-cybersecurity-analyst-do-salaries-skills-job-outlook\/\" target=\"_self\" >CYSE 201: Journal Entry 11: Video Review &#8211; What does a Cybersecurity Analyst Do? Salaries, Skills &amp; Job Outlook<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">This video about the cybersecurity analyst job shows how much the role connects to social behavior. It\u2019s not just about stopping attacks or fixing systems. Analysts have to work with people across different teams and explain threats in ways that make sense to everyone, not just tech experts. They also help train employees to spot&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-11-02T03:41:35+00:00\">November 2, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-336 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/02\/journal-entry-10-social-cybersecurity-article\/\" target=\"_self\" >CYSE 201: Journal Entry 10: Social Cybersecurity Article<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Reading this article helped me understand how social cybersecurity focuses more on people and behavior than just systems and data. It breaks down how attackers use manipulation, like misinformation, fake profiles, and phishing, to target individuals and communities online. I thought it was interesting how the article emphasized that humans are often the weakest link&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-11-02T03:20:34+00:00\">November 2, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":31179,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/pages\/377"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/users\/31179"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/comments?post=377"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/pages\/377\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/pages\/377\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/media?parent=377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}