{"id":225,"date":"2024-04-22T16:02:20","date_gmt":"2024-04-22T16:02:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/?p=225"},"modified":"2024-04-22T16:02:20","modified_gmt":"2024-04-22T16:02:20","slug":"journal-entry-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/journal-entry-10\/","title":{"rendered":"Journal Entry 10"},"content":{"rendered":"\n<p>Justin DeLoach<br>24 March 2024<br>As the article suggests, the next war is digital and it has already begun. The article puts major<br>emphasis on the fact that social cybersecurity is incredibly important because understanding<br>social cybersecurity red flags is hand in hand with detecting and predicting the digital future.<br>Lieutenant Colonel Beskow and Doctor Carley also speak on the significance in difference<br>between what is stated as social cybersecurity and traditional cybersecurity. That difference<br>being that while cybersecurity deals with the hacking of technology, its counterpart attacks the<br>human itself. The last major edition to the article was the mention of bots as another problem<br>with the social cybersecurity issue. Bots are able to apply themselves as reinforcers for fake<br>news as it is spread on the internet. Not only are they able to spread fake news but also go into<br>the comment sections and act like multiple people supporting the comment to increase its social<br>value as truth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Justin DeLoach24 March 2024As the article suggests, the next war is digital and it has already begun. The article puts majoremphasis on the fact that social cybersecurity is incredibly important because understandingsocial cybersecurity red flags is hand in hand with&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/journal-entry-10\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/225"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/users\/28356"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"predecessor-version":[{"id":226,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/225\/revisions\/226"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}