{"id":320,"date":"2025-01-29T00:13:29","date_gmt":"2025-01-29T00:13:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/?page_id=320"},"modified":"2025-01-29T00:13:29","modified_gmt":"2025-01-29T00:13:29","slug":"about-me-page","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/about-me-page\/","title":{"rendered":"About Me Page"},"content":{"rendered":"\n<p>Experience: My experience with cybersecurity is that I have been using technology since elementary school. I love technology and use it for my art and schoolwork. I got into cybersecurity when I was in middle school I loved to see how our data was protected and our information also.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:296px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"413\" class=\"wp-block-cover__image-background wp-image-321\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image.png 620w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-300x200.png 300w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-450x300.png 450w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Parsimony<\/p>\n<\/div><\/div>\n\n\n\n<p>The principle of parsimony should be used sparingly in Cyber Security. This principle is the extreme unwillingness to spend money or use resources. Using parsimony is good if an idea is not worthwhile or it costs too much<br>money.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:272px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"518\" class=\"wp-block-cover__image-background wp-image-322\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-1.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-1.png 425w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-1-246x300.png 246w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Empiricism<\/p>\n<\/div><\/div>\n\n\n\n<p>I believe the principle of empiricism in cyber security is portrayed as the empierces and observations you get when you work inside of cyber security.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:264px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"688\" class=\"wp-block-cover__image-background wp-image-323\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-2-1024x688.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-2-1024x688.png 1024w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-2-300x202.png 300w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-2-768x516.png 768w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-2-446x300.png 446w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-2.png 1440w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Determinism<\/p>\n<\/div><\/div>\n\n\n\n<p>I don\u2019t believe this principle should ever be implemented in cyber security. All events should not happen because of the universe, and we can&#8217;t unchanged them.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:217px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"350\" class=\"wp-block-cover__image-background wp-image-324\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-3.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-3.png 612w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-3-300x172.png 300w, https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-content\/uploads\/sites\/37284\/2025\/01\/image-3-525x300.png 525w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Objectivity<\/p>\n<\/div><\/div>\n\n\n\n<p>The principle of objectivity is important in Cyber Security. Having a lack of bias, judgment or prejudice can help you become more diverse and also willing to try and accept new things.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experience: My experience with cybersecurity is that I have been using technology since elementary school. I love technology and use it for my art and schoolwork. I got into cybersecurity when I was in middle school I loved to see how our data was protected and our information also. The principle of parsimony should be&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/about-me-page\/\">Read More<\/a><\/div>\n","protected":false},"author":29809,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/pages\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/users\/29809"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/pages\/320\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joseph-portfolio777\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}