{"id":311,"date":"2024-12-10T18:32:35","date_gmt":"2024-12-10T18:32:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/?page_id=311"},"modified":"2024-12-11T04:48:56","modified_gmt":"2024-12-11T04:48:56","slug":"journal-entry-10","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-10\/","title":{"rendered":"Journal Entry 10"},"content":{"rendered":"\n<p>Jahmeel Campbell<br>11\/6\/24<br>Week 10 &#8211; Journal Entry 10<br>The article on social cybersecurity highlights a developing issue in the digital age. The<br>relationship between cybersecurity and social behavior. It talks about how attackers take<br>advantage of people&#8217;s weaknesses to control actions, spread false information, and access private<br>systems. The article also highlights the necessity of proactive approaches in controlling the social<br>components of cyber threats and the significance of addressing both the technical and social<br>aspects of cybersecurity.<br>One key takeaway is the recognition that cybersecurity is no longer just about protecting systems<br>but also about safeguarding the people who interact with them. People must receive education<br>and training to identify and fight off social engineering attacks. This supports the belief that<br>people military individuals or civilians need to be ready for both internal and external cyber<br>threats that prey on social norms and trust.<br>I found it particularly interesting how the article points out that cybersecurity policies should<br>extend beyond technical solutions to include strategies that address human behaviors, such as<br>recognizing phishing attempts or safeguarding against disinformation. Social cybersecurity<br>requires both the technological and psychological aspects of defense.<br>This article strengthened my belief that cybersecurity is as much about people as it is about<br>technology. Our defenses must consider how criminals take advantage of social dynamics and<br>counter these threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jahmeel Campbell11\/6\/24Week 10 &#8211; Journal Entry 10The article on social cybersecurity highlights a developing issue in the digital age. Therelationship between cybersecurity and social behavior. It talks about how attackers takeadvantage of people&#8217;s weaknesses to control actions, spread false information, and access privatesystems. The article also highlights the necessity of proactive approaches in controlling the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-10\/\">Read More<\/a><\/div>\n","protected":false},"author":29731,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/311"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/users\/29731"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/311\/revisions"}],"predecessor-version":[{"id":358,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/311\/revisions\/358"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/media?parent=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}