{"id":272,"date":"2024-01-22T03:54:37","date_gmt":"2024-01-22T03:54:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mgree035\/?p=272"},"modified":"2024-01-28T19:26:59","modified_gmt":"2024-01-28T19:26:59","slug":"week-2-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mgree035\/2024\/01\/22\/week-2-journal-entry\/","title":{"rendered":"Week 2 &#8211; Journal Entry"},"content":{"rendered":"\n<p><strong>Explain how the principles of science relate to cybersecurity.<\/strong><\/p>\n\n\n\n<p>Principles of science relate to cybersecurity in multiple ways; problems are identified and investigated, potential ideas or theories are formed as solutions to those problems, those ideas\/theories are tested, results are recorded, conclusions based on those results are made and whichever solution was the most effective will be used and expanded on later.&nbsp; The systematic approach remains the same for the most part, and the ideas are implemented in a way that can be applied to cyber-related issues.<\/p>\n\n\n\n<p>For example:&nbsp; analysis of data on recent cyberattacks and potential threats could reveal that there are certain vulnerabilities in an internal system.&nbsp; The threats could be dealt with individually where they are investigated, and ideas are proposed that could mitigate or remedy the threat; the ideas could then be tested in some sort of isolated environment where the effects of the testing won\u2019t interfere with the normal operations of the system; results of the testing are recorded where they will likely be compared in order to figure out the best solution; conclusions are made regarding the best solution that will be implemented and likely expanded on in the future to keep remedying the problem (until it is invalid).&nbsp; This type of approach could be applied to a multitude of cybersecurity-related issues.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explain how the principles of science relate to cybersecurity. Principles of science relate to cybersecurity in multiple ways; problems are identified and investigated, potential ideas or theories are formed as solutions to those problems, those ideas\/theories are tested, results are recorded, conclusions based on those results are made and whichever solution was the most effective &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/mgree035\/2024\/01\/22\/week-2-journal-entry\/\">Continue reading<\/a><\/p>\n","protected":false},"author":26743,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/272"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/users\/26743"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/comments?post=272"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/272\/revisions"}],"predecessor-version":[{"id":274,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/272\/revisions\/274"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/media?parent=272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/categories?post=272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/tags?post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}