{"id":249,"date":"2024-04-23T01:07:19","date_gmt":"2024-04-23T01:07:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mekhi\/?page_id=249"},"modified":"2024-04-23T20:15:46","modified_gmt":"2024-04-23T20:15:46","slug":"journal-11","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mekhi\/journal-11\/","title":{"rendered":"Journal 11"},"content":{"rendered":"\n<p>Mekhi D. Booker<\/p>\n\n\n\n<p>Old Dominion University<\/p>\n\n\n\n<p>CYSE201S<\/p>\n\n\n\n<p>March 27th, 2024<\/p>\n\n\n\n<p>The role of a cybersecurity analyst often encompasses various social themes that resonate with broader human behaviors and societal dynamics. At its core, this job requires analysts to understand not just technical threats but also the motivations and patterns of human interaction. The presentation of a cybersecurity analyst&#8217;s work suggests themes of trust, vigilance, and collaboration. Analysts must trust and be trusted by their colleagues, clients, and stakeholders, building networks of reliable information exchange. They must be vigilant, constantly monitoring for unusual activities and potential breaches that could disrupt the social fabric of organizations or communities. This vigilance extends to understanding social engineering tactics, where hackers exploit human psychology to gain unauthorized access to systems. Collaboration is another key theme, as cybersecurity analysts often work within diverse teams, bridging technical expertise with effective communication to ensure a cohesive security strategy. Ultimately, the job reflects the intersection of technology and human behavior, emphasizing the need to understand social dynamics to effectively mitigate cybersecurity risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mekhi D. Booker Old Dominion University CYSE201S March 27th, 2024 The role of a cybersecurity analyst often encompasses various social themes that resonate with broader human behaviors and societal dynamics. At its core, this job requires analysts to understand not just technical threats but also the motivations and patterns of human interaction. The presentation of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mekhi\/journal-11\/\">Read More<\/a><\/div>\n","protected":false},"author":25263,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages\/249"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/users\/25263"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages\/249\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages\/249\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/media?parent=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}