{"id":330,"date":"2025-08-07T09:03:57","date_gmt":"2025-08-07T09:03:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=330"},"modified":"2025-08-07T09:16:55","modified_gmt":"2025-08-07T09:16:55","slug":"cyse-201s-module-10-journal-entry-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/cyse-201s-module-10-journal-entry-2\/","title":{"rendered":"CYSE 201S Module 10 Journal Entry 2               Social Cybersecurity on Emerging National Security"},"content":{"rendered":"\n<p> Social cybersecurity is here to stay, and it might be the next war we might be fighting?<\/p>\n\n\n\n<p>We are already battling with information warfare. This might be a military article but it<\/p>\n\n\n\n<p>applies to the civilian sector. The author&#8217;s statement is correct, the use or<\/p>\n\n\n\n<p>misinformation can be a powerful tool, it weakens the trust within, dividing societies,<\/p>\n\n\n\n<p>breaking our culture, tumbling institutions and making us question our own values.<\/p>\n\n\n\n<p>Technology has allowed actors to fight and infiltrate the use of bogus journalism and<\/p>\n\n\n\n<p>misinformation, promoting fake news from a far might be the new weapon, there are no<\/p>\n\n\n\n<p>more geographical limitations or borders where actual physical presence is a<\/p>\n\n\n\n<p>requirement anymore, only a cyber domain is needed. Additionally fact checking might<\/p>\n\n\n\n<p>be a thing of the past, because individuals have to do it themselves and it is just easier<\/p>\n\n\n\n<p>to believe what people are posting, laziness might be winning this round for sure. The<\/p>\n\n\n\n<p>interesting fact is that there is only one country in this whole world that cannot be<\/p>\n\n\n\n<p>socially manipulated, North Korea is the only one that still requires physical presence<\/p>\n\n\n\n<p>due to all its internet restrictions and manipulations. This vulnerability our society faces<\/p>\n\n\n\n<p>today due to social manipulation is outrageous, making social cybersecurity a new era<\/p>\n\n\n\n<p>of national security that will definitely affect future conflicts at all levels, not only<\/p>\n\n\n\n<p>domestically but internationally. It&#8217;s creating the base for cyber-infrastructure required to<\/p>\n\n\n\n<p>help society maintain its fundamental nature in a changing mediated information<\/p>\n\n\n\n<p>environment evolving conditions.<\/p>\n\n\n\n<p>Information is becoming the most powerful thing, and it cannot be stopped and cannot<\/p>\n\n\n\n<p>be left unchecked. Decentralized quality control of information is not trusted like before,<\/p>\n\n\n\n<p>too many hands in the pot, now its use to affirm their own biases. Governments might<\/p>\n\n\n\n<p>try to place controls, but my belief is that we are way too far to be able to make a<\/p>\n\n\n\n<p>change to implement censorship because people might believe their freedom of free<\/p>\n\n\n\n<p>speech will be taken, creating chaos, so it is a really a thin line to cross, so what can be<\/p>\n\n\n\n<p>the medium to help us maintain information accurate and true?<\/p>\n\n\n\n<p><strong>Reference:<\/strong><\/p>\n\n\n\n<p><strong>Beskow, D. M, &amp; Carley, Kathleen M. (M.D.). <\/strong><strong><em>Social Cybersecurity an<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>emerging national security requirement<\/em><\/strong><strong>. Army University Press.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-<\/a><\/p>\n\n\n\n<p><strong>Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social cybersecurity is here to stay, and it might be the next war we might be fighting? We are already battling with information warfare. This might be a military article but it applies to the civilian sector. The author&#8217;s statement is correct, the use or misinformation can be a powerful tool, it weakens the trust&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/cyse-201s-module-10-journal-entry-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/330\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}