{"id":363,"date":"2023-07-18T14:28:04","date_gmt":"2023-07-18T14:28:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=363"},"modified":"2023-07-18T14:28:04","modified_gmt":"2023-07-18T14:28:04","slug":"journal-entry-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-10\/","title":{"rendered":"Journal Entry 10"},"content":{"rendered":"\n<p>Read this and write a journal entry summarizing your response to the<br>article on social cybersecurity<\/p>\n\n\n\n<p>Social cybersecurity is part of warfare. It is the hacking of \u201cpeople\u201d and the society along with them. This has such an impact because it doesn\u2019t need physical presence. With the help of social media social cybersecurity is able to be used all over and reach far more people than being physically present would. As well as decentralization so it is low cost for this done. People can spread information however they want and are able to stay anonymous while doing it.<\/p>\n\n\n\n<p>Watch this video. As you watch the video<br>https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0, think about how<br>the description of the cybersecurity analyst job relates to social<br>behaviors. Write a paragraph describing social themes that arise in the<br>presentation.<\/p>\n\n\n\n<p>Cybersecurity analysts have multiple duties within their job. Which would be seen as systemic thinkers. Responding to phishing and intrusion attacks and monitoring the network. As well performing guidance and training. This would seen as having technical and social skills. As well writing papers and research on flaws. Having these duties for the better of the company would be seen as them being team players.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this and write a journal entry summarizing your response to thearticle on social cybersecurity Social cybersecurity is part of warfare. It is the hacking of \u201cpeople\u201d and the society along with them. This has such an impact because it doesn\u2019t need physical presence. With the help of social media social cybersecurity is able to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-10\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/363"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/363\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}