{"id":336,"date":"2025-11-02T03:20:34","date_gmt":"2025-11-02T03:20:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/?p=336"},"modified":"2025-11-02T03:21:31","modified_gmt":"2025-11-02T03:21:31","slug":"journal-entry-10-social-cybersecurity-article","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/02\/journal-entry-10-social-cybersecurity-article\/","title":{"rendered":"CYSE 201: Journal Entry 10: Social Cybersecurity Article"},"content":{"rendered":"\n<p>Reading this <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831\">article<\/a> helped me understand how social cybersecurity focuses more on people and behavior than just systems and data. It breaks down how attackers use manipulation, like misinformation, fake profiles, and phishing, to target individuals and communities online. I thought it was interesting how the article emphasized that humans are often the weakest link in cybersecurity, and how social engineering plays a big role in that.<\/p>\n\n\n\n<p>The paper also covered a lot of detection techniques, like machine learning and agent-based modeling, which I\u2019m starting to learn more about. What stood out to me was how important it is to combine tech with psychology and sociology to really understand these threats. The section on deepfakes and AI-generated misinformation was especially relevant, since those are becoming more common.<\/p>\n\n\n\n<p>Overall, this article gave me a better sense of how cybersecurity isn\u2019t just technical. It\u2019s also social, and that\u2019s something I want to keep in mind as I continue studying and working in this field.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reading this article helped me understand how social cybersecurity focuses more on people and behavior than just systems and data. It breaks down how attackers use manipulation, like misinformation, fake profiles, and phishing, to target individuals and communities online. I thought it was interesting how the article emphasized that humans are often the weakest link&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/2025\/11\/02\/journal-entry-10-social-cybersecurity-article\/\">Read More<\/a><\/div>\n","protected":false},"author":31179,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/posts\/336"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/users\/31179"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/posts\/336\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afieldseportfolio\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}