{"id":321,"date":"2024-03-25T01:10:35","date_gmt":"2024-03-25T01:10:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/?p=321"},"modified":"2024-03-25T01:10:35","modified_gmt":"2024-03-25T01:10:35","slug":"journal-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/2024\/03\/25\/journal-11\/","title":{"rendered":"Journal 11"},"content":{"rendered":"\n<p>The social themes in this video presentation with the cybersecurity analyst jobs with regards to social behaviors.\u00a0 This video seems like it really starts with the human firewall and needing to educate employees on cybersecurity and detecting and patching the network for threats.\u00a0 Analysts have to be able to spot phishing attacks, they need to be able to quarantine items on individual computers, and monitor the network.\u00a0 The social behaviors that influence these types of situations arise when people do things that create breaches in the company\u2019s systems. For example, human behaviors can greatly influence what types of attacks they are vulnerable to which could potentially impact the company. Social themes that impact being able to get one of these types of jobs is networking so that you can meet people that can provide introductions to people that can help you get into the field.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The social themes in this video presentation with the cybersecurity analyst jobs with regards to social behaviors.\u00a0 This video seems like it really starts with the human firewall and needing to educate employees on cybersecurity and detecting and patching the network for threats.\u00a0 Analysts have to be able to spot phishing attacks, they need to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/2024\/03\/25\/journal-11\/\">Read More<\/a><\/div>\n","protected":false},"author":28422,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/users\/28422"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/321\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}