{"id":259,"date":"2025-04-28T19:57:16","date_gmt":"2025-04-28T19:57:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/iholl003\/?page_id=259"},"modified":"2025-04-28T20:17:18","modified_gmt":"2025-04-28T20:17:18","slug":"week-11-journal-entry-11","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/journal-entries\/week-11-journal-entry-11\/","title":{"rendered":"Journal Entry #11"},"content":{"rendered":"\n<p>1.)As you watch the videohttps:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an<br>external site. , think about how the description of the cybersecurity analyst job relates to social<br>behaviors.<br>2.)Write a paragraph describing social themes that arise in the presentation.<br>One of the biggest social themes mentioned in the video was the concept of cybersecurity<br>culture which is the shared knowledge, behaviors, and values that influence how people<br>interact with digital safety. Cybersecurity analysts must comprehend technical risks and human<br>behaviors that form vulnerabilities, like weak passwords. This correlates directly to social<br>norms, like the expectation not to share passwords. The video also speaks about how analysts<br>communicate with different departments and stakeholders, which reflects the sociological<br>importance of group communication, shared beliefs, and organizational values. The role<br>requires awareness of different subcultures within cybersecurity, including users who prioritize<br>convenience over safety, or hackers who believe in open access to all information. These<br>different values show how cybersecurity is deeply shaped by social behaviors, cultural beliefs,<br>and the need for analysts to work with both technology and people.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.)As you watch the videohttps:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to anexternal site. , think about how the description of the cybersecurity analyst job relates to socialbehaviors.2.)Write a paragraph describing social themes that arise in the presentation.One of the biggest social themes mentioned in the&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/journal-entries\/week-11-journal-entry-11\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30376,"featured_media":0,"parent":232,"menu_order":11,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/259"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/users\/30376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/259\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/259\/revisions\/292"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/232"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/media?parent=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}