{"id":384,"date":"2023-12-07T03:27:37","date_gmt":"2023-12-07T03:27:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/?p=384"},"modified":"2023-12-07T03:27:37","modified_gmt":"2023-12-07T03:27:37","slug":"explain-how-the-principles-of-science-relate-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/2023\/12\/07\/explain-how-the-principles-of-science-relate-to-cybersecurity\/","title":{"rendered":"Explain how the principles of science relate to cybersecurity."},"content":{"rendered":"\n<p>Science and Cybersecurity have a deep coherent bold that interlinks the two in a<br>variety of ways. Science is the observation and identification of a theoretical explanation.<br>Cybersecurity relates to science as one of the major aspects of defending a system and<br>observing that system against threats. I would describe cybersecurity as a defense against<br>systems and devices. I would also say within the cybersecurity field the identification of threats<br>and the prevention of threats through tests such as pen testing. Pen testing can be thought of<br>as essentially, a science experiment. Authorized security professionals will run a mock cyber<br>attack on a computer system to see if it is strong enough to protect itself from the real<br>thing. There are also a lot of policies in cybersecurity such as when you agree to the terms of<br>service. These are related to the aspect of identification within a specific server. When agreeing<br>to these terms you are agreeing to be a part of a research study of some kind in which companies<br>trying to monetize someone\u2019s intellectual property.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Science and Cybersecurity have a deep coherent bold that interlinks the two in avariety of ways. Science is the observation and identification of a theoretical explanation.Cybersecurity relates to science as one of the major aspects of defending a system andobserving that system against threats. I would describe cybersecurity as a defense againstsystems and devices. I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/joshuabenedict\/2023\/12\/07\/explain-how-the-principles-of-science-relate-to-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":26286,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/384"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/users\/26286"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/comments?post=384"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/384\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/384\/revisions\/385"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/media?parent=384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/categories?post=384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/tags?post=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}