{"id":82,"date":"2024-09-10T20:32:06","date_gmt":"2024-09-10T20:32:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/amoocyber\/?p=82"},"modified":"2024-12-08T20:32:44","modified_gmt":"2024-12-08T20:32:44","slug":"journal-2-the-principles","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/amoocyber\/2024\/09\/10\/journal-2-the-principles\/","title":{"rendered":"Journal 2: The Principles"},"content":{"rendered":"<p>he principles of science include experimentation, observation, and hypothesis testing.<br \/>\nThese principles weigh on cybersecurity heavily by continuous observation. This is<br \/>\nessential to cybersecurity because it watches network behavior and naming different<br \/>\nanomalies. When including experiments, it can stimulate attacks and can assess how<br \/>\ndifferent vulnerabilities. Using hypothesis tests ids very crucial when an individual is<br \/>\ninvestigating incidents. Doing this is where theories that involve theories for potential<br \/>\nthreats get tested against data to find an issue. Experimentation is used to simulate attacks<br \/>\nand assess vulnerabilities. In conclusion, the principles of science of evidence is based on<br \/>\nmaking guided decisions in developing security protocols that ensures actions are based<br \/>\non facts instead of made-up assumptions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>he principles of science include experimentation, observation, and hypothesis testing. These principles weigh on cybersecurity heavily by continuous observation. This is essential to cybersecurity because it watches network behavior and naming different anomalies. When including experiments, it can stimulate attacks&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/amoocyber\/2024\/09\/10\/journal-2-the-principles\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27469,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts\/82"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/users\/27469"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts\/82\/revisions"}],"predecessor-version":[{"id":83,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts\/82\/revisions\/83"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/media?parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/categories?post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/tags?post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}