{"id":404,"date":"2024-03-23T22:44:10","date_gmt":"2024-03-23T22:44:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/?p=404"},"modified":"2024-03-23T22:44:10","modified_gmt":"2024-03-23T22:44:10","slug":"journal-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/2024\/03\/23\/journal-10\/","title":{"rendered":"Journal #10"},"content":{"rendered":"\n<p>I believe that the article \u201cSocial Cybersecurity An Emerging\u00a0 National Security Requirement\u201d is a very informative article about the relatively new concept of social cybersecurity. The article states that cybersecurity is like using a computer to hack into other computers and social cybersecurity is using computers to hack into humans. This is fascinating because you wouldn&#8217;t think that it is possible to \u201chack\u201d a human. However, people have been \u201chacking\u201d other people for a long time, sometimes without even noticing. Hacking someone is just tricking them into believing something else whether it is done positively or negatively. I also believe that this article shares a lot of important information, because it talks about how social cybersecurity is becoming a big part of how wars and battles will be fought. The article says \u201cAn actor can win the next war before it has even begun. In fact, reflecting the change from periodic conflict to continual competition, senior leaders in the Russian General Staff have claimed, \u201cWars are not declared but have already begun.\u201d \u201d This shows that social cybersecurity will be on the rise in future wars because being able to have the upper hand or even \u201cwin\u201d before the war has even started is a huge advantage, so knowing this concept or using it to your advantage will be an essential part of how a country follows through with its attacks. In conclusion, this article shows how social cybersecurity works. It also shows the importance of social cybersecurity in war and how it has already been used in the past.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I believe that the article \u201cSocial Cybersecurity An Emerging\u00a0 National Security Requirement\u201d is a very informative article about the relatively new concept of social cybersecurity. The article states that cybersecurity is like using a computer to hack into other computers and social cybersecurity is using computers to hack into humans. This is fascinating because you&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-cameron\/2024\/03\/23\/journal-10\/\">Read More<\/a><\/div>\n","protected":false},"author":28195,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/404"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/users\/28195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/404\/revisions"}],"predecessor-version":[{"id":405,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/404\/revisions\/405"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/media?parent=404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/categories?post=404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/tags?post=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}