{"id":715,"date":"2025-04-18T13:59:33","date_gmt":"2025-04-18T13:59:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/epres010\/?p=715"},"modified":"2025-04-18T13:59:33","modified_gmt":"2025-04-18T13:59:33","slug":"cyse-300-computer-and-information-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/epres010\/2025\/04\/18\/cyse-300-computer-and-information-security\/","title":{"rendered":"CYSE 300 &#8211; Computer and Information Security"},"content":{"rendered":"\n<p><em><strong>What is the defining difference between computer security and information security?\u00a0 Why can we argue that information security is really an application of social science?<\/strong><\/em><\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<p>There are several similarities between computer security and information security, but the primary difference is what\u2019s being protected. Computer security focuses on protecting a network and system associated with a computer. This also prevents both hardware and software from becoming infected and ensures correct usability and accessibility. , information security is about protecting the personal information, credentials, or data of people. It prevents people from opening up their information to potential identity theft or phishing.<\/p>\n\n\n\n<p>This is why information security can be argued as an application to social science due to its fundamental involvement in people. There\u2019s the human element that is applied to these systems to make them more secure for protecting data from breaches. That element is also applied to analyzing what people do to mitigate risk and applying necessary practices to make change.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is the defining difference between computer security and information security?\u00a0 Why can we argue that information security is really an application of social science? There are several similarities between computer security and information security, but the primary difference is what\u2019s being protected. Computer security focuses on protecting a network and system associated with a &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/epres010\/2025\/04\/18\/cyse-300-computer-and-information-security\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 300 &#8211; Computer and Information Security<\/span><\/a><\/p>\n","protected":false},"author":24915,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/715"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/users\/24915"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/comments?post=715"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/715\/revisions"}],"predecessor-version":[{"id":716,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/715\/revisions\/716"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/media?parent=715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/categories?post=715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/tags?post=715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}