{"id":337,"date":"2024-08-05T01:32:47","date_gmt":"2024-08-05T01:32:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=337"},"modified":"2024-08-05T01:32:47","modified_gmt":"2024-08-05T01:32:47","slug":"article-analysis","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/article-analysis\/","title":{"rendered":"Article Analysis"},"content":{"rendered":"\n<p>This article relates to principles of the social sciences because cyberthreats have to focus<br>on human behavior with having to teach humans on how to prevent cyber threats entering the<br>network, look back on trends and then basing on what type of detection systems that one should<br>use, and having more jobs in cybersecurity which is a supply and demand for the protection. The<br>research question in this article is what is the best defense to use against cyberthreats, there are<br>many different types of defense\u2019s that can be used and it is trying to differentiate which one to<br>use with which cyberthreat. The type of research methods used was case studies from past<br>attacks and what they can gather from as well as gather information from different organizations<br>that specialize in ranking and making other companies aware of the cyber threats like IEEE,<br>SIEM, and CTI.The type of data collected is archival research and case studies because of the<br>reports from different types of unclassified CTI\u2019s as well as crowdsourcing , which means any<br>company or organization can identify the security risk they are seeing. This article relates to the<br>concepts that we talk about relativism, the cyber threats that we read about in this article leads to<br>the development of better and more advanced cyber defense. Everything is related and that<br>without having a cyberthreat there would be no need for cyber defense. The type of research that<br>is being used is archival research while it used to be only physical things , now there is a way to<br>access different types of information on the internet and the article uses a lot of archival research<br>to develop the cyber defense. This article dives into the psychological factors that influence what<br>defenses are important to cybersecurity behaviors. The article is trying to spread knowledge<br>which helps educate not just companies but regular people that did not know about the cyber<br>threat become aware of the issue. The issue with this topic is that smaller business owners may<br>not be able to afford the research to be done on cyber threats. Another marginalized group of<br>people that may find all this challenging is people that are not as technologically savvy to understand the words and acronyms that are being used in this article. The social contributions<br>that this article made is development and almost volunteering different ways to help combat<br>cyber threats and making a database for companies to locate and submit information and cyber<br>threats that they see.<\/p>\n\n\n\n<p>N. Sun et al., &#8220;Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey<br>and New Perspectives,&#8221; in IEEE Communications Surveys &amp; Tutorials, vol. 25, no. 3, pp.<br>1748-1774, 2023, doi: 10.1109\/COMST.2023.3273282.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article relates to principles of the social sciences because cyberthreats have to focuson human behavior with having to teach humans on how to prevent cyber threats entering thenetwork, look back on trends and then basing on what type of detection systems that one shoulduse, and having more jobs in cybersecurity which is a supply&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/article-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/337"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/337\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}