{"id":376,"date":"2024-08-04T20:41:58","date_gmt":"2024-08-04T20:41:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/?p=376"},"modified":"2024-08-05T00:39:18","modified_gmt":"2024-08-05T00:39:18","slug":"module-10-journal-entries-1-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/2024\/08\/04\/module-10-journal-entries-1-2\/","title":{"rendered":"Module 10 Journal Entries 1 &amp; 2 &#8211; CYSE 201S"},"content":{"rendered":"\n<p>Journal entry 1 : <\/p>\n\n\n\n<p>Working as a cybersecurity analyst means that someone will get to encounter various social<br>themes over their career. Some of the social themes could be phishing, social engineering, and<br>victimology. In recent years cyber criminals have moved away from targeting organizations and<br>began focusing on more vulnerable populations. They began to realize that it was more profitable<br>to target these populations due to their limited cybersecurity protections and knowledge.<br>Phishing and social engineering techniques were deployed against small businesses and SM<br>users. Phishing emails often rely on social engineering tactics making it even more important for<br>users to understand their psychological triggers as a defense and fostering a culture of<br>cybersecurity awareness is essential. In most cases cyber offenders are successful in getting the<br>data that they need; this is where cybersecurity analysts profile the victims to understand how to<br>best protect them online. Victimology helps cybersecurity professionals understand the<br>characteristics of potential victims such as their technical skills, online behavior, and<br>susceptibility to social engineering tactics. When cyber security analysts profile the victims, it<br>allows for them to create more targeted cyber security measures to protect them and other<br>vulnerable populations online. Being empathetic helps understand the motivations of attackers<br>and the potential impact of security breaches on businesses and citizens. Another social theme<br>that may arise when working as a cybersecurity analyst is privacy vs. security. Society will<br>continue to become digitalized making it important to keep in mind that analyst should be able to<br>communicate clearly and concisely to collaborate with other professionals and inform social<br>media users.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Journal Entry 2:<\/p>\n\n\n\n<p>orking as a cybersecurity analyst means that someone will get to encounter various social<br>themes over their career. Some of the social themes could be phishing, social engineering, and<br>victimology. In recent years cyber criminals have moved away from targeting organizations and<br>began focusing on more vulnerable populations. They began to realize that it was more profitable<br>to target these populations due to their limited cybersecurity protections and knowledge.<br>Phishing and social engineering techniques were deployed against small businesses and SM<br>users. Phishing emails often rely on social engineering tactics making it even more important for<br>users to understand their psychological triggers as a defense and fostering a culture of<br>cybersecurity awareness is essential. In most cases cyber offenders are successful in getting the<br>data that they need; this is where cybersecurity analysts profile the victims to understand how to<br>best protect them online. Victimology helps cybersecurity professionals understand the<br>characteristics of potential victims such as their technical skills, online behavior, and<br>susceptibility to social engineering tactics. When cyber security analysts profile the victims, it<br>allows for them to create more targeted cyber security measures to protect them and other<br>vulnerable populations online. Being empathetic helps understand the motivations of attackers<br>and the potential impact of security breaches on businesses and citizens. Another social theme<br>that may arise when working as a cybersecurity analyst is privacy vs. security. Society will<br>continue to become digitalized making it important to keep in mind that analyst should be able to<br>communicate clearly and concisely to collaborate with other professionals and inform social<br>media users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal entry 1 : Working as a cybersecurity analyst means that someone will get to encounter various socialthemes over their career. Some of the social themes could be phishing, social engineering, andvictimology. In recent years cyber criminals have moved away from targeting organizations andbegan focusing on more vulnerable populations. They began to realize that it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/2024\/08\/04\/module-10-journal-entries-1-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28264,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts\/376"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/users\/28264"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/comments?post=376"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts\/376\/revisions"}],"predecessor-version":[{"id":396,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts\/376\/revisions\/396"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/media?parent=376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/categories?post=376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/tags?post=376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}