{"id":343,"date":"2023-03-27T09:00:48","date_gmt":"2023-03-27T14:00:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonburke\/?p=343"},"modified":"2024-02-02T18:51:01","modified_gmt":"2024-02-02T23:51:01","slug":"journal-10-national-information-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandonburke\/2023\/03\/27\/journal-10-national-information-security\/","title":{"rendered":"Journal 10 \u2013 National &amp; Information Security"},"content":{"rendered":"\n<p><em>Information and national security need cybersecurity in order to stay safe and secure. However, there are threat actors that are willing to take any measures necessary to get their hands on confidential data. This leads to a term called information warfare, which can compromise national security.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Rise of Information Warfare and Its Importance<\/h2>\n\n\n\n<p>According to the article, information warfare is the main type of warfare that occurs on a daily basis. The victor of this type of warfare is determined by who has state of the art security. Having the best security is important and people and machines are needed to complete this task. The article states, \u201cmany researchers in this field are leveraging computational social science tools such as network analysis, spatial analysis, semantic analysis, and machine learning\u201d (Beskow &amp; Carley, 2019). All of these factors are imperative to keep data secure and away from prying eyes. These factors must also be updated constantly because cybersecurity and vulnerabilities are changing every minute of every day. This means that security must have constant attention to prevent data from being compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Beskow, D. M., &amp; Carley, K. M. (2019).\u00a0<em>Social Cybersecurity an Emerging National Security Requirement<\/em>. Army University Press. Retrieved March 28, 2023, from https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Information and national security need cybersecurity in order to stay safe and secure. However, there are threat actors that are willing to take any measures necessary to get their hands on confidential data. This leads to a term called information&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/2023\/03\/27\/journal-10-national-information-security\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24541,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/343"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/users\/24541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/343\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/media?parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/categories?post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/tags?post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}