{"id":213,"date":"2025-10-08T16:40:32","date_gmt":"2025-10-08T16:40:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/?p=213"},"modified":"2025-10-08T16:42:26","modified_gmt":"2025-10-08T16:42:26","slug":"week-2-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/2025\/10\/08\/week-2-journal-entry\/","title":{"rendered":"Week 2 &#8211; Journal Entry"},"content":{"rendered":"\n<p><strong><em>Details: <\/em><\/strong>How does the principle of empiricism enhance the effectiveness of cybersecurity practices? Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems.<\/p>\n\n\n\n<p><strong><em>My Response: <\/em><\/strong>Empiricism significantly boosts cybersecurity practices by anchoring its strategies into tangible evidence. By collecting and analyzing empirical data, cybersecurity experts can spot any emerging threats through the observation of genuine attack methods and system vulnerabilities. This method facilitates the evaluation of current security protocols by gauging their success against real world threats, and not just by hypothetical dangers. This knowledge steers the creation of freshly new tactics, guaranteeing that they&#8217;re rooted in true techniques and tackle concrete weak points in information systems. This data driven approach enables continuous refinement and adaption, ensuring cybersecurity measures and remains effective and relevant in the face of evolving threats.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Details: How does the principle of empiricism enhance the effectiveness of cybersecurity practices? Reflect on how empirical data collection and analysis can help identify emerging threats, assess&hellip; <span class=\"read-more\"><a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/2025\/10\/08\/week-2-journal-entry\/\" rel=\"bookmark\">Read more <span class=\"screen-reader-text\">&#8220;Week 2 &#8211; Journal Entry&#8221;<\/span><\/a><\/span><\/p>\n","protected":false},"author":26908,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts\/213"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/users\/26908"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":227,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts\/213\/revisions\/227"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}