{"id":299,"date":"2023-09-14T01:27:24","date_gmt":"2023-09-14T01:27:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/?p=299"},"modified":"2023-09-14T01:27:24","modified_gmt":"2023-09-14T01:27:24","slug":"how-the-principles-of-science-relate-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/2023\/09\/14\/how-the-principles-of-science-relate-to-cybersecurity\/","title":{"rendered":"How the principles of science relate to cybersecurity"},"content":{"rendered":"\n<p>Science and Cybersecurity have a deep coherent bold that interlinks the two in a variety of ways. Science is the observation and identification of a theoretical explanation. Cybersecurity relates to science as one of the major aspects of defending a system and observing that system against threats. I would describe cybersecurity as a defense against systems and devices. I would also say within the cybersecurity field the identification of threats and the prevention of threats through tests such as pen testing. Pen testing can be thought of as essentially, a science experiment. Authorized security professionals will run a mock cyber attack on a computer system in order to see if it is strong enough to protect itself from the real thing. There are also a lot of policies in cybersecurity such as when you agree to the terms of service. These are related to the aspect of identification within a specific server. When agreeing to these terms you are agreeing to be a part of a research study of some kind in which companies trying to monetize someone\u2019s intellectual property.  <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Science and Cybersecurity have a deep coherent bold that interlinks the two in a variety of ways. Science is the observation and identification of a theoretical explanation. Cybersecurity relates to science as one of the major aspects of defending a system and observing that system against threats. I would describe cybersecurity as a defense against&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/joshuabenedict\/2023\/09\/14\/how-the-principles-of-science-relate-to-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":26286,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/users\/26286"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/299\/revisions\/304"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}