{"id":279,"date":"2023-04-18T21:01:59","date_gmt":"2023-04-18T21:01:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ethanlombos\/?p=279"},"modified":"2023-04-18T21:11:57","modified_gmt":"2023-04-18T21:11:57","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ethanlombos\/2023\/04\/18\/the-human-factor-in-cybersecurity\/","title":{"rendered":"Protecting Availability"},"content":{"rendered":"\n<p>Say That I am A CISO for a company. There are many protection I could use and implement to ensure availability of my system. There is a few I would implement. One, is I will try to see if there are any open points in the software or firewall because with those open point the system will be or is in danger. A other protection that I would implement will be make sure that the network I am working on is safe and secure. If I know it is not I will implement a VPN to secure my network. Plus another protection I would do is apply any antivirus software. But if there already is a antivirus software I will check if it is updated and replace the outdated ones.\u00a0\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Say That I am A CISO for a company. There are many protection I could use and implement to ensure availability of my system. There is a few I would implement. One, is I will try to see if there are any open points in the software or firewall because with those open point the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/2023\/04\/18\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":25871,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/users\/25871"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts\/279\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}