{"id":256,"date":"2025-02-03T01:32:36","date_gmt":"2025-02-03T01:32:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/?page_id=256"},"modified":"2025-04-30T03:14:29","modified_gmt":"2025-04-30T03:14:29","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-258 post type-post status-publish format-standard hentry category-uncategorized\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/02\/03\/week-1-journal-entry\/\" target=\"_self\" >Week 1 Journal Entry<\/a><\/h2>\n\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Review the NICE Workforce Framework. Are there certain areas that you\u00a0would want to focus your career on? Explain which areas would appeal\u00a0the most to you and which would appeal the least. Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)Links to an external site. <\/p><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-02-03T01:32:37+00:00\">February 3, 2025<\/time><\/div>\n<\/li><li class=\"wp-block-post post-273 post type-post status-publish format-standard hentry category-uncategorized\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/02\/03\/week-2-journal-entry\/\" target=\"_self\" >Week 2 Journal Entry<\/a><\/h2>\n\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The principles of science relate to cybersecurity in numerous ways. Determinism: Determinism means that an outcome is caused or influenced by a preceding event. When related to cybersecurity, determinism is that an attack had occurred because of a previous event. An example of this would be if an employee opened up a phishing email and&#8230;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-02-03T01:38:05+00:00\">February 3, 2025<\/time><\/div>\n<\/li><li class=\"wp-block-post post-291 post type-post status-publish format-standard hentry category-uncategorized\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/02\/03\/week-3-journal-entry\/\" target=\"_self\" >Week 3 Journal Entry<\/a><\/h2>\n\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Visit\u00a0PrivacyRights.org.\u00a0to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? Enter a paragraph in your journal. Researchers can use this information to better educate themselves with information on over 70,000 incidents. This database updates monthly, which will provide updated information, as well as observe trends to determine what&#8230;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-02-03T04:54:28+00:00\">February 3, 2025<\/time><\/div>\n<\/li><\/ul><\/div>\n\n\n\n\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-15-journal-entry-15\/\">Week 15 Journal Entry 15<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-13-journal-entry-14\/\">Week 13 Journal Entry 14<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-12-journal-entry-13\/\">Week 12 Journal Entry 13<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-12-journal-entry-12\/\">Week 12 Journal Entry 12<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-11-journal-entry-11\/\">Week 11 Journal Entry 11<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"","protected":false},"author":30517,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/256"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/users\/30517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/256\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/256\/revisions\/413"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/media?parent=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}