{"id":213,"date":"2025-02-03T02:08:51","date_gmt":"2025-02-03T02:08:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/?page_id=213"},"modified":"2025-04-28T04:38:07","modified_gmt":"2025-04-28T04:38:07","slug":"cybersecurity-and-social-sciences","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/cybersecurity-and-social-sciences\/","title":{"rendered":"CYSE201S: Cybersecurity and Social Sciences"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Cybersecurity involves five maincomponents, these are critical and must be covered in any discussion of the subject. All of these components work together to create a solid understanding of cybersecurity. As seen in the photos and explanations below, social sciences also play an important part in cybersecurity.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"216\" src=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-217\" style=\"width:318px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image.png 600w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-300x108.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/figure><\/div>\n\n\n<p>Confidentiality is very important because it protects sensitive information from unwanted access. It protects personal, financial, and business data by preventing identity theft\u00a0and data breaches. Maintaining privacy is needed for establishing confidence with users\u00a0while also protecting corporate processes and relationships. I truly value confidentiality because it strengthens the security in both personal and professional environments. I believe that maintaining confidentiality develops an environment of trust and ethical behavior.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"350\" src=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-1.png\" alt=\"\" class=\"wp-image-219\" style=\"width:522px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-1.png 700w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-1-300x150.png 300w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-1-600x300.png 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/figure><\/div>\n\n\n<p>Integrity is important because it makes sure that data is correct. It maintains the reliability of information by preventing\u00a0manipulation, which could harm systems and decision making. In terms\u00a0of social sciences, data integrity assures ethical research techniques and dependable results. I value integrity because it also\u00a0develops honesty and reliability in both personal and professional environments. Keeping integrity is critical for establishing trust\u00a0and\u00a0promoting informed decisions about society.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"326\" height=\"155\" src=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-2.png\" alt=\"\" class=\"wp-image-220\" style=\"width:360px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-2.png 326w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-2-300x143.png 300w\" sizes=\"(max-width: 326px) 100vw, 326px\" \/><\/a><\/figure><\/div>\n\n\n<p>Availability is essential because it guarantees that data and services are available when needed, even during interruptions. It ensures that operations continue without interruption. In the social sciences, maintaining availability enables quick access to essential data and study conclusions. I value\u00a0availability because it ensures that systems remain functioning and responsive, which is critical for company success. Availability improves effective decision-making and makes sure that services are always available, building trust in systems and procedures.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"467\" src=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-3.png\" alt=\"\" class=\"wp-image-221\" style=\"width:359px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-3.png 700w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-3-300x200.png 300w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-3-600x400.png 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/figure><\/div>\n\n\n<p>Authentication is important because it confirms the identity of individuals and systems, making sure only authorized people have access to sensitive information. This prevents unauthorized access in order to\u00a0protect\u00a0against false or harmful activities. In the social sciences, authentication helps in verifying the validity of study participants and data, consequently promising ethical procedures. I value authentication because it improves security as a whole, resulting in\u00a0more trusted personal and professional environments. Reliable authentication systems are required to secure identities and ensure system integrity.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"318\" src=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-4.png\" alt=\"\" class=\"wp-image-222\" style=\"width:485px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-4.png 640w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-4-300x149.png 300w, https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-content\/uploads\/sites\/38442\/2025\/02\/image-4-600x298.png 600w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><\/figure><\/div>\n\n\n<p>Non-repudiation is important because it prevents individuals from denying their acts\u00a0in a transaction, which ensures that people take\u00a0accountability. It lessens disagreements by requiring that acts or messages be traceable. Non-repudiation is vital in the social sciences and cybersecurity\u00a0because it ensures the legitimacy of data. I value\u00a0non-repudiation because it promotes responsibility and transparency in both digital and human relationships. Non-repudiation ensures confidence\u00a0and strengthens the credibility of research in a variety of businesses, including social sciences.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity involves five maincomponents, these are critical and must be covered in any discussion of the subject. All of these components work together to create a solid understanding of cybersecurity. As seen in the photos and explanations below, social sciences&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/cybersecurity-and-social-sciences\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25911,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/pages\/213"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/users\/25911"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/pages\/213\/revisions"}],"predecessor-version":[{"id":240,"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/pages\/213\/revisions\/240"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201eportfolio\/wp-json\/wp\/v2\/media?parent=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}