{"id":346,"date":"2023-07-18T14:21:17","date_gmt":"2023-07-18T14:21:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=346"},"modified":"2023-07-18T14:21:17","modified_gmt":"2023-07-18T14:21:17","slug":"journal-entry-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-2\/","title":{"rendered":"Journal Entry 2"},"content":{"rendered":"\n<p>Explain how the principles of science relate to cybersecurity<\/p>\n\n\n\n<p>Principles of science relate to cybersecurity because it allows research to be conducted effectively. It allows them to be able to understand behaviors within statistics and people as well in the cyberspace. It also relates because when they conduct experiments they have certain principles they can use as guidelines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explain how the principles of science relate to cybersecurity Principles of science relate to cybersecurity because it allows research to be conducted effectively. It allows them to be able to understand behaviors within statistics and people as well in the cyberspace. It also relates because when they conduct experiments they have certain principles they can&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-2\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/346"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/346\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/346\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}