{"id":311,"date":"2025-07-06T19:10:19","date_gmt":"2025-07-06T19:10:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=311"},"modified":"2025-08-07T09:29:07","modified_gmt":"2025-08-07T09:29:07","slug":"cyse-201s-week-two-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/07\/06\/cyse-201s-week-two-journal-entry\/","title":{"rendered":"CYSE 201S Week Two Journal Entry               Principles of Science In Cybersecurity"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Now that I am getting more educated on the realm of cybersecurity, I can understand<\/p>\n\n\n\n<p>clearly now, how the principles of science relates to cybersecurity. It makes it clear how<\/p>\n\n\n\n<p>it has become such a multidisciplinary field, everything seems so deeply integrated that<\/p>\n\n\n\n<p>they are able to work effectively, providing a better understanding, helping develop<\/p>\n\n\n\n<p>better frameworks and in essence, improving all practices related to cybersecurity.<\/p>\n\n\n\n<p>Here are the six Principles as Science and how they relate to cybersecurity:<\/p>\n\n\n\n<p><strong>1. Relativism:<\/strong><\/p>\n\n\n\n<p>This principle concept acknowledges the interconnectedness of all things<\/p>\n\n\n\n<p>connected or related in a way. Cybersecurity risks and countermeasures are<\/p>\n\n\n\n<p>affected by the interaction of societal shifts and technological progress, as each<\/p>\n\n\n\n<p>viewpoint adds to the discussion and has significance.<\/p>\n\n\n\n<p><strong>2. Objectivity:<\/strong><\/p>\n\n\n\n<p>People have to be 100% objective, that means that they have to be impartial in<\/p>\n\n\n\n<p>their studies and theories where they should not be influenced by personal<\/p>\n\n\n\n<p>feelings nor personal opinions when considering and representing facts. When<\/p>\n\n\n\n<p>assessing risks and vulnerabilities, cybersecurity experts must remain objective<\/p>\n\n\n\n<p>and impartial without regard to worth, and refrain from letting their personal<\/p>\n\n\n\n<p>prejudices or ideas influence their judgment. The purpose of science is to<\/p>\n\n\n\n<p>unbiasedly and objectively increase knowledge.<\/p>\n\n\n\n<p><strong>3. Parsimony:<\/strong><\/p>\n\n\n\n<p>This principle is to provide the simplest explanations as feasible as possible, to<\/p>\n\n\n\n<p>go straight to the point, without all the jargon. The goal of cybersecurity solutions<\/p>\n\n\n\n<p>is to be solved simply and doable. Effective and targeted security measures are<\/p>\n\n\n\n<p>encouraged by this principle, while successfully resolving any problem, which<\/p>\n\n\n\n<p>might sound easy, but human behavior can be so unpredictable.<strong>4. Empiricism:<\/strong><\/p>\n\n\n\n<p>This concept states that the studies must be kept real and physical, based on<\/p>\n\n\n\n<p>facts and empirical evidence, as opposed depending on conjecture and belief.<\/p>\n\n\n\n<p>We should never, ever base our understanding of cybersecurity on judgment or<\/p>\n\n\n\n<p>gut feelings. If people do this, it might result in inaccurate, erroneous and useless<\/p>\n\n\n\n<p>findings. Using real world observations and factual data to enhance security<\/p>\n\n\n\n<p>procedures, technology and strategies, helps us in moving forward and<\/p>\n\n\n\n<p>surpasses presumptions findings, concentrating on what has been effectively<\/p>\n\n\n\n<p>proven to be able to safeguard networks and systems.<\/p>\n\n\n\n<p><strong>5. Ethical Neutrality:<\/strong><\/p>\n\n\n\n<p>This concept just states that we must adhere to and must perform all research in<\/p>\n\n\n\n<p>accordance with ethical norms, standards, principals and most important legal<\/p>\n\n\n\n<p>frameworks, in addition protecting the works of those individuals being studied.<\/p>\n\n\n\n<p>This creates many opportunities in cybersecurity, many chances to investigate<\/p>\n\n\n\n<p>cybercrime from a social science perspective.<\/p>\n\n\n\n<p><strong>6. Determinism:<\/strong><\/p>\n\n\n\n<p>This concept just indicates that a previous occurrence causes, determines, or<\/p>\n\n\n\n<p>influences behavior or event, like people can&#8217;t resist the idea that the actions in<\/p>\n\n\n\n<p>human behavior are determined or influenced by previous events.<\/p>\n\n\n\n<p>Cybersecurity recognizes that past decisions and activities have an impact on<\/p>\n\n\n\n<p>outcomes in the digital environment. This idea emphasizes how crucial it is to<\/p>\n\n\n\n<p>take preventative security measures in order to stop future cyber attacks. At the<\/p>\n\n\n\n<p>end of the day, individuals make the choice, it&#8217;s all about free-will, they are<\/p>\n\n\n\n<p>determined to cause an event in a particular way. Their own choice.<\/p>\n\n\n\n<p>I really had to research how the principles of science relate to cybersecurity, some are<\/p>\n\n\n\n<p>easier than others to understand for sure, but we can honestly agree that they are<\/p>\n\n\n\n<p>fundamental to the advancement, progress and efficiency in cybersecurity. They<\/p>\n\n\n\n<p>become essential in the development, testing and improvement in strategies to be able<\/p>\n\n\n\n<p>to protect systems of cyber threats and all cyber as a whole.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now that I am getting more educated on the realm of cybersecurity, I can understand clearly now, how the principles of science relates to cybersecurity. It makes it clear how it has become such a multidisciplinary field, everything seems so deeply integrated that they are able to work effectively, providing a better understanding, helping develop&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/07\/06\/cyse-201s-week-two-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/311"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":355,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/311\/revisions\/355"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}