{"id":231,"date":"2023-01-23T00:29:46","date_gmt":"2023-01-23T00:29:46","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2023-01-23T04:52:17","modified_gmt":"2023-01-23T04:52:17","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/ece-416\/","title":{"rendered":"Journal Entry #02"},"content":{"rendered":"\n<p class=\"has-small-font-size\">Explain how the principles of science relate to cybersecurity. <\/p>\n\n\n\n<p>Science and cybersecurity are intimately intertwined in a number of areas, including the study of human behavior. The scientific method is used in cybersecurity to collect data of various kinds, draw conclusions based on evidence that is absent, and more. Sociology is another way that cybersecurity makes use of science. Sociology contributes to cybersecurity by examining human behavior, which helps us comprehend why someone could commit a crime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explain how the principles of science relate to cybersecurity. Science and cybersecurity are intimately intertwined in a number of areas, including the study of human behavior. The scientific method is used in cybersecurity to collect data of various kinds, draw conclusions based on evidence that is absent, and more. Sociology is another way that cybersecurity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/ece-416\/\">Read More<\/a><\/div>\n","protected":false},"author":24717,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/users\/24717"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/231\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}