{"id":319,"date":"2024-01-15T04:35:19","date_gmt":"2024-01-15T04:35:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/enimo\/?page_id=319"},"modified":"2025-04-28T14:07:17","modified_gmt":"2025-04-28T14:07:17","slug":"journals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/enimo\/journals\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background has-medium-font-size\">                      <strong>Aspects of cyber security I will tailor my career around<\/strong><\/p>\n\n\n\n<p>The aspects of cyber security I would like to tailor my career around will be Analyze. which means i will be performing highly &#8211; specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. I will also be interested in Collect and operate, which means providing specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. My third choice will be operate and maintain, which means that i will be providing support, administration, and maintenance necessary to ensure effective and efficient information technology system performance and security. This areas will appeal to me because of the nature of the responsibility it places on me, analyzing, collecting and operating, operating and maintaining a all based on data that is readily available. Which means that they will all be centered around one specialty, meaning that if you can perform one you can easily perform the other so my expertise in one of the three will translate to the other. The one operation i would be least interested in will be investigate because i believe it takes up more of a law enforcement approach, which means that it will be more rigorous&nbsp; and many turns to find out information.<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">                  <\/p>\n\n\n\n<p><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p class=\"has-text-align-center has-pale-pink-background-color has-background has-medium-font-size\"><strong>How the principles of science relate to cybersecurity     <\/strong>   <\/p>\n\n\n\n<p>The principles of science such as relativism, objectivity, determinism, ethical neutrality, skepticism, parsimony. Relativism relates to cyber security in the sense that it is connected many things. Cyber security is a huge umbrella that covers a lot of things, such as data security, computer network security, physical security and many more. As it relates to many things and is intertwined with many things, a change in one thing can cause a change in another thing, that is how relativism is demonstrated in the field of cyber security. Objectivity is another area that cyber security relates with the principles of science because actions that are taken under the guise of cyber security are based on facts, facts pertaining to which areas need attention and protection from bad actors, what kind of laws should be passed to ensure the security of cyber space to discourage bad actors from perpetuating cyber crimes. The third relation between the principles of science and cyber security is empiricism because all things relating to cyber security can be either touched or seen which falls under the characteristics of empiricism. Ethical neutrality is another commonality between cyber security and the principles of science. Ethical neutrality means that ethical standards must be adhered to when research is being conducted, which means that whenever there is a cyber security research being conducted whether to find solutions or investigate a problem ethical standard can not be overlooked or forfeited to the benefit of the investigation or research.&nbsp;<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-background-color has-background has-medium-font-size\"><strong>How might researchers use information from <em>Privacy.Right.org<\/em> to study breaches ?<\/strong><\/p>\n\n\n\n<p>With the data that <em>PrivacyRighst.org<\/em> provides on their website regarding data breaches in the United States researchers can use that data in performing analysis. The data on their websites contains the states the breaches occurred in. They provide the number of individuals that were affected by the data breach. They also provide the number of breach notification letters that were reviewed. This kind of data provide researches information that is vital to understanding data breaches and how to prevent them from happening in the future. With the data that is provided researches can investigate the type of companies that were victims of data breaches and analyze any commonalities to assist in creating solutions for those companies. Furthermore, researchers can use the PrivacyRights.org information to analyze the methods that were employed to breach the data of the affected companies from within same and different states. By performing this kind of analysis, it will provide awareness on what methods bad actors often use in victimizing organizations and their clients. Which will help provide a more direct solution to data breaches based on the methods that were used in creating the data breaches versus a generalized approach to preventing data preaches.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-light-green-cyan-background-color has-background\">5 Levels of Need<\/h2>\n\n\n\n<p>In Maslow\u2019s Hierarchy of Needs he explains that all humans have needs that exist on a hierarchy. He stated that when lower level needs are met in the life of a human they tend to focus on meeting their upper needs.<\/p>\n\n\n\n<p>I will list the 5 levels of Maslow\u2019s Hierarchy of Needs and explain how they relate to me in my digital experience :<\/p>\n\n\n\n<p><strong>Physiological needs<\/strong>: This level of need is related to food, water, warmth and rest &#8211; They relate to me in the sense that I do my best work while working with or on computers when these needs are met. When I am not hungry, thirsty, cold, or tired while sitting at a computer to get work done, I do a better job getting the work done.<\/p>\n\n\n\n<p><strong>Need for safety<\/strong>: The level of need is related to security and safety &#8211; When i\u2019m using online services such as apple pay, and purchasing items on various website, I purchase with confidence when I know the website is a reputable one and has ample security measures in place to protect my data. However, I shy away from websites that look suspicious or are not popularly known websites because the chances of such websites not having ample security to protect my data is very high.<\/p>\n\n\n\n<p><strong>Need for belongingness and love<\/strong>: This level of need is related to intimate relationships, and friends &#8211; Knowing that I have friends that post on social media frequently is the reason a check my Instagram more often to see what my friends and family members I follow are posting and sharing with me.<\/p>\n\n\n\n<p><strong>Need for esteem<\/strong>: This need is related to prestige and feeling of accomplishment &#8211; Whenever i post something whether a video, picture or quote on a social media platform and I receive likes and positive comments it makes me feel accomplished, knowing that others are in favor of my posts. Secondly I feel accomplished whenever I can figure out new technology and use it the way it was intended to be used to make doing certain things a bit easier. Such as connecting with family that live abroad via WhatsApp.<\/p>\n\n\n\n<p><strong>Need for self &#8211; actualization<\/strong>: This need is related to achieving our full potential including creative activities &#8211; Self &#8211; actualization occurred for me when I started working as an analyst at a company and had to figure out the system they were using to provide their clients services and being able to use it in an efficient manner and understanding how to use the system to help and provide services for clients.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-light-green-cyan-background-color has-background\">Motive Ranking From Most Sense To Least Sense<\/h2>\n\n\n\n<ol>\n<li><strong>Political<\/strong>: I ranked political motive at the most sensible, because most of the&nbsp;&nbsp;important issues in the world are hinged political leaders and political views.<\/li>\n\n\n\n<li><strong>Money<\/strong>: I ranked money as the second motive because there are many important reasons for one to have money such as taking care family, self, being influential in society and being respected among our family members and peers.<\/li>\n\n\n\n<li><strong>Multiple Reasons<\/strong>: Having multiple reasons to do something is makes a strong case for why you should do it because it has multiple benefits. Hence is similar to killing two birds with one stone<\/li>\n\n\n\n<li><strong>Revenge<\/strong>: Revenge is coming from a place of hurt and pain. Hence I understand why certain people will find it hard to forgive and as a result perpetuate crimes to revenge the person they feel hurt them, stole from them or disfavored the.<\/li>\n\n\n\n<li><strong>Recognition<\/strong>: Having low self esteem can cause people to be recognized as heroes and other important figures in the eyes of certain people if not all people. As a result, I can see the rational being someone doing something to be recognized.<\/li>\n\n\n\n<li><strong>Entertainment<\/strong>: Having fun is a very strong emotional to feel. But some people have not matured enough to understand the boundaries that come with having fun, to know that is not just about having fun but rather about having fun safely without hurting oneself or others in the process&nbsp;<\/li>\n\n\n\n<li><strong>Boredom<\/strong>: I\u2019m my opinion boredom is the least of the seven motivations because there are more than ample ways to alleviate boredom without committing a crime or hurting others. Hence whoever perpetuates a crime simply because they are bored should just find something better to do.<\/li>\n<\/ol>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-luminous-vivid-orange-background-color has-background\">Detecting a Fake Website from a Genuine Website<\/h2>\n\n\n\n<p>A fake website will most likely contain grammatical errors both in the URL and the content of the website. Fake website also does not contain the locked padlock that symbolizes security for a website. I fake website will not have accurate information pertaining to what they claim to represent on the website. Clicking on a content on a fake website could download unauthorized malicious software to your device. Content on a fake website may look outdated which could indicate that the website has not been updated in a while. &nbsp;A genuine website on the other hand will be free of grammatical errors and there will be a padlock next to the URL that symbolizes security. Content on a genuine website can most likely be verified via another platform, such as youtube or a social media account. A genuine website provides accurate information such as the email address, phone number and a physical address that can be verified by performing a simple google search.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"36\" data-id=\"397\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/32px-Computer_user_icon.svg.png\" alt=\"\" class=\"wp-image-397\" \/><figcaption class=\"wp-element-caption\">Lets work<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"81\" data-id=\"398\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/128px-Summer_school_GLAM_giorno_1_1-3.jpg\" alt=\"\" class=\"wp-image-398\" \/><figcaption class=\"wp-element-caption\">Lets brainstorm ideas<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"170\" data-id=\"399\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/256px-CellPhone_16491636068.jpg\" alt=\"\" class=\"wp-image-399\" \/><figcaption class=\"wp-element-caption\">Identify the threat<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" data-id=\"400\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash-1-1.jpg\" alt=\"\" class=\"wp-image-400\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash-1-1.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash-1-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash-1-1-450x300.jpg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">Write a report<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" data-id=\"401\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1.jpg\" alt=\"\" class=\"wp-image-401\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1-450x300.jpg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">Problem solved<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"402\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/avi-richards-Z3ownETsdNQ-unsplash-2.jpg\" alt=\"\" class=\"wp-image-402\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/avi-richards-Z3ownETsdNQ-unsplash-2.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/avi-richards-Z3ownETsdNQ-unsplash-2-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/avi-richards-Z3ownETsdNQ-unsplash-2-400x300.jpg 400w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">Analyzing <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" data-id=\"403\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/cookie-the-pom-gySMaocSdqs-unsplash-2.jpg\" alt=\"\" class=\"wp-image-403\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/cookie-the-pom-gySMaocSdqs-unsplash-2.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/cookie-the-pom-gySMaocSdqs-unsplash-2-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/cookie-the-pom-gySMaocSdqs-unsplash-2-450x300.jpg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">Lets figure this out<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"960\" data-id=\"404\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/erik-mclean-BXiLSwwvqrY-unsplash-1-1.jpg\" alt=\"\" class=\"wp-image-404\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/erik-mclean-BXiLSwwvqrY-unsplash-1-1.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/erik-mclean-BXiLSwwvqrY-unsplash-1-1-200x300.jpg 200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">Analyze<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" data-id=\"405\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/headway-5QgIuuBxKwM-unsplash-3.jpg\" alt=\"\" class=\"wp-image-405\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/headway-5QgIuuBxKwM-unsplash-3.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/headway-5QgIuuBxKwM-unsplash-3-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/headway-5QgIuuBxKwM-unsplash-3-450x300.jpg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">How is this happening<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"853\" data-id=\"406\" src=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-2.jpg\" alt=\"\" class=\"wp-image-406\" srcset=\"https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-2.jpg 640w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-2-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/enimo\/wp-content\/uploads\/sites\/32739\/2025\/03\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-2-630x840.jpg 630w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\"><strong>We found the problem<\/strong><\/figcaption><\/figure>\n<\/figure>\n\n\n\n<p>The text on the pictures represent different stages of attaining cyber security. Without going through these stages cyber security cannot be attained. These memes also represents the integration of humans and technological tools, in order for humans to plan how to achieve cyber security, they need to analyze data that is captured using technological tools.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">How Media Influences Our Understanding About Cybersecurity<\/h2>\n\n\n\n<p>Based on the video, i think mostly the media does a pretty good job establishing how hackers execute their game plans to achieve their objectives. However, the examples that the media uses to portray hacking is not always accurate or relatable to reality. The&nbsp; media through movies have succeeded in painting a mostly accurate picture on how hackers operate. Spanning from picking their targets, why they pick those targets, how they search and collect data to help them succeed in attaining their objectives. Without the media\u2019s portrayal of hacking i believe most people will not have an idea of how hackers plot, plan and execute, which will mean that many will also not know how to protect themselves from hackers. Knowing how your attacker attacks provides tremendous insight on protecting yourself from becoming a victim. The media plays a very important role in reminding the public on how serious cybersecurity is and how detrimental it can be if one falls victim to a bad actor. As a result i believe many are aware of cybersecurity and take measures to ensure that they are protected at all times from hackers and bad actors to the best of their abilities.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Social Media Scale<\/h2>\n\n\n\n<p>I scored low on the social media disorder scale, mainly because i&#8217;m not addicted to social media the way the younger generation is. The items in the scale are a good way to measure the current generations obsession with social media and the need for validation from it particularly from the younger generation. I believe different patterns are found across the world because different culture, different belief systems and different values systems. These are the things that make us different from one nation to the other.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Social Cybersecurity<\/h2>\n\n\n\n<p>Social cybersecurity is the protection of humans from information warfare. Social cybersecurity is not like traditional cybersecurity which targets technological equipments but social cybersecurity is targeted at human beings to dictate or to influence the way they think. Due to the advancements in technology information warfare is become the main war that nationals fight against each other rather than traditional wars. Hence, nations have to discover a new way to protect themselves from the information warfare that are waged against them from other nations. Social cybersecurity is predicated on manipulating information and news networks to fulfill an agenda and not necessarily provide accurate information to people. This kind of manipulations are used to influence people\u2019s minds to either accept or reject certain things in society. An example of this is how Russia used information manipulation in time past and even in today\u2019s world to paint nations the don\u2019t like as evil and also propagate the airwaves&nbsp; with favorable informations about themselves to win favor in their eyes of their citizens. Information warfare is the new war that all nations are fighting and desire to emerge as winners. Information warfare in some cases have replaced traditional warfare due to its convenience and&nbsp; and the fact that it requires less resources to fight those wars.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Wha does a Cybersecurity Analyst do ?<\/h2>\n\n\n\n<p>A cybersecurity analyst role has many titles depending on the individual companies want to call them. However, the duties performed are usually the same. Moreover, there are many avenues to become a cybersecurity analyst the same way there are many social behaviors that can lead to a singular thing. Networking is one of the keys to be able to secure a job as a cybersecurity analyst. The ability to think and analyze the current world in order to find professional position or decide what to do to secure a job. A cybersecurity analyst has to do what most people do on a daily basis, which analyzing people or information and making decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Sample Data Breach Notification<\/h2>\n\n\n\n<p>After reading the article \u201cSample Data Breach Notification\u201d, I can state the the two economic theories related to it are incentives and scarcity. Incentive relates to the article in the sense that the perpetrators that caused the breach had something to gain from it. Which provided a reason for them to hack the website and to collect customer payment data. This seems to be the main reason why perpetrators take risk to hack systems, because they believe that the reward is worth the risk. Therefore, they are incentivized to take the risk in spite of what potential consequences maybe. The second economic theory that relates to this bleach is scarcity. Scarcity is relatable in the sense that after the breach occurred there are very few options available to the company to mitigate the impact of the bleach. I couldn\u2019t recognize any social science theory that relates with this particular data breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">Top Five Illegal Things Done on the Internet<\/span><\/h2>\n\n\n\n<p>   1.Using Unofficial Streaming Service<\/p>\n\n\n\n<p>   2. Recording a VOIP Call Without Consent<\/p>\n\n\n\n<p>  3. Using Copyrighted Images<\/p>\n\n\n\n<p>  4. Collecting Information about Children<\/p>\n\n\n\n<p>  5.Using Other People\u2019s Internet Networks<\/p>\n\n\n\n<p>Reason :<\/p>\n\n\n\n<p>I listed the above illegal things to do out of the 11 in the article because i believe these five are the most consequential ones that have major impacts on people\u2019s finances, intellectual properties and identifies. when using an unofficial streaming service is stealing money from the creator and the official streamers of the content. Recording a VOIP call without consent is a criminal offense due to using some ones voice or sharing any information unauthorized can cause a lot of damage for that person. Collecting information about children is very dangerous because what will a person collecting information about children in an unauthorized manner suggest about the person that is collecting the information. Using copyright images without authorization is stealing intellectual property.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Digital Forensics<\/h2>\n\n\n\n<p>I thought Davin Teo\u2019s path to his career was very interesting. The fact that he attributed his career choice to his father really stood out to me on how parents can be fundamental in shaping the interests of their children. I thought it was great that he started out as an accountant based on what he could do at the time and then later transitioned into a forensic investigator. He seems to really enjoy his career as a forensic investigator, which also means that he does a very good job at executing his job responsibilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aspects of cyber security I will tailor my career around The aspects of cyber security I would like to tailor my career around will be Analyze. which means i will be performing highly &#8211; specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. I will also be interested in Collect&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/enimo\/journals\/\">Read More<\/a><\/div>\n","protected":false},"author":26278,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[]"},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages\/319"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/users\/26278"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages\/319\/revisions"}],"predecessor-version":[{"id":425,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages\/319\/revisions\/425"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/media?parent=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}