{"id":363,"date":"2024-12-07T20:08:25","date_gmt":"2024-12-07T20:08:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/?p=363"},"modified":"2024-12-07T20:08:25","modified_gmt":"2024-12-07T20:08:25","slug":"week-2-journal-entry-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-2-journal-entry-2\/","title":{"rendered":"Week 2 &#8211; Journal Entry 2"},"content":{"rendered":"\n<p>Science is a systematic process using organized knowledge in any field to study any<br>area of interest. In the case of cybersecurity, threats are everywhere and<br>organizations, groups, as well as people, must find innovative ways to counter these<br>threats. Cybersecurity is considered a multidisciplinary field encompassing many<br>subjects such as sociology, political science, and psychology, just to name a few.<br>Cybercriminals each have different motives for attacking a system and, the field of<br>social cybersecurity attempts to learn about the motives of these attacks, and how<br>perpetrators deceive their victims in giving out sensitive information to the wrong<br>people. In the case of ransomware, the user\u2019s data is encrypted until the victim<br>pays a ransom to the hacker to unlock the data. If no payment is remitted to the<br>hacker within a certain amount of time, the amount of money needed to be paid<br>increases. Eventually, the data will be destroyed by ransomware. Consequently, the<br>victim must quickly make a choice between saving personal data by paying the<br>ransom, or risk losing all personal data, which is catastrophic. Furthermore, the use<br>of technology, as well as manipulating people through various psychological means<br>is a major area to be studied by social cybersecurity experts. With regards to social<br>media technology, it can be used to influence people maliciously, as well as develop<br>social groups or bring certain groups down. Regarding science, observations about a<br>threat\u2019s behavior must be made. Next, a hypothesis is determined to learn what<br>cybersecurity countermeasures will work against a threat. Experiments will be<br>performed to see if the hypothesis of the chosen solutions effectively mitigate the<br>threat. After the experiment, data on what solutions are effective against the threat<br>are recorded, and the best solutions or countermeasures will be used to mitigate<br>the threat. Lastly, the incident will be written up, so that in the future, cybersecurity<br>professionals know how to deal with that threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Science is a systematic process using organized knowledge in any field to study anyarea of interest. In the case of cybersecurity, threats are everywhere andorganizations, groups, as well as people, must find innovative ways to counter thesethreats. Cybersecurity is considered a multidisciplinary field encompassing manysubjects such as sociology, political science, and psychology, just to name&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-2-journal-entry-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29388,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/363"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/users\/29388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/363\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}