{"id":243,"date":"2024-03-23T21:22:18","date_gmt":"2024-03-23T21:22:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/?p=243"},"modified":"2024-03-23T21:22:18","modified_gmt":"2024-03-23T21:22:18","slug":"week-11-journal-entry-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/2024\/03\/23\/week-11-journal-entry-11\/","title":{"rendered":"Week 11 Journal Entry 11"},"content":{"rendered":"\n<p class=\"has-cool-to-warm-spectrum-gradient-background has-background\">Think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-cool-to-warm-spectrum-gradient-background has-background\">As shown in the video, the job of the cybersecurity analyst connects with various social behaviors. The speaker stresses the significance of understanding the human psychology and behavior patterns to look at threats or even potential ones. They stress the significance of seeing social engineering tactics used by malicious entities, and even showing their exploitation of vulnerabilities. They do this by gaining trust and then gain unauthorized access to things. Looking at this video it also showing the communication skills that are dealing with security protocols and making sure users are educated on the behaviors of cybersecurity. the presentation illustrates how social behaviors significantly influence cybersecurity strategies and defenses. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation. As shown in the video, the job of the cybersecurity analyst connects with various social&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/2024\/03\/23\/week-11-journal-entry-11\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28280,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts\/243"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/users\/28280"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/comments?post=243"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts\/243\/revisions"}],"predecessor-version":[{"id":244,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts\/243\/revisions\/244"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/media?parent=243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/categories?post=243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/tags?post=243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}