{"id":242,"date":"2025-03-28T18:19:35","date_gmt":"2025-03-28T18:19:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/?p=242"},"modified":"2025-03-28T18:19:35","modified_gmt":"2025-03-28T18:19:35","slug":"week-11-journal-entry-cyber-analyst-and-social-behavior","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/2025\/03\/28\/week-11-journal-entry-cyber-analyst-and-social-behavior\/","title":{"rendered":"Week 11 &#8211; Journal Entry &#8211; Cyber Analyst and Social Behavior"},"content":{"rendered":"\n<p>Watching the video, the first thing that stuck out was cybersecurity analysts dealing with phishing attacks and end-user awareness training. While I work as a cybersecurity analyst, these are two areas I do not have to handle. The closest I do in terms for either one is the implementation of technical controls to prevent phishing attacks and ensuring the customer is implementing yearly security awareness trainings for the end-users. I mainly focus on the technical side of cybersecurity. I feel having end-user training remains as one of the most important aspects of cybersecurity. Reducing the factors that contribute to victimization is one of the first lines of defense for a network. Working to understand and adjust user behavior, communication, and education when online and using the network helps minimize the risk of a potential attack or breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Watching the video, the first thing that stuck out was cybersecurity analysts dealing with phishing attacks and end-user awareness training. While I work as a cybersecurity analyst, these are two areas I do not have to handle. The closest I do in terms for either one is the implementation of technical controls to prevent phishing &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/2025\/03\/28\/week-11-journal-entry-cyber-analyst-and-social-behavior\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Week 11 &#8211; Journal Entry &#8211; Cyber Analyst and Social Behavior<\/span><\/a><\/p>\n","protected":false},"author":23698,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts\/242"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/users\/23698"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/comments?post=242"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts\/242\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts\/242\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/media?parent=242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/categories?post=242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/tags?post=242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}