{"id":141,"date":"2024-09-25T16:17:17","date_gmt":"2024-09-25T16:17:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-04-28T20:11:33","modified_gmt":"2025-04-28T20:11:33","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mharr094\/cyse-300\/","title":{"rendered":"Week 2 Journal Entry"},"content":{"rendered":"\n<p>Science and cybersecurity share a foundation in observation, experimentation, and evidence-based reasoning. Both disciplines aim to solve problems, predict outcomes, and develop new solutions based on logical analysis. By applying the principles of science, cybersecurity professionals can better understand, anticipate, and counteract evolving threats while continually enhancing the reliability and resilience of digital systems.<\/p>\n\n\n\n<p><strong>Week 4 Journal Entry<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1EknH9YnY_KqailV8nQ8HMjS0vSCuaQga_UDxQm7vmQw\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1EknH9YnY_KqailV8nQ8HMjS0vSCuaQga_UDxQm7vmQw\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p><strong>Week 6 Journal Entry<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1_bSLLkN_NgTeP_IIz-jxnLRDZqzZZOUtLq9y4cFtRX0\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1_bSLLkN_NgTeP_IIz-jxnLRDZqzZZOUtLq9y4cFtRX0\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p><strong>Week 7 Journal Entry<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1i7gWCrNvrPYB9uVhtrAEdkTgV2cuVOsROuCaH56lPOY\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1i7gWCrNvrPYB9uVhtrAEdkTgV2cuVOsROuCaH56lPOY\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p><strong>Week 8 Journal Entry<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1vpJ6_xnFQmH84tvcK5HvEElNp4n00tBDskK8ayF6J3A\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1vpJ6_xnFQmH84tvcK5HvEElNp4n00tBDskK8ayF6J3A\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p>Week 10 Entry <\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/10LbF8pkpuqqy5coVjuCDTsGwTKN9RfKxNL3qJmfGS3w\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/10LbF8pkpuqqy5coVjuCDTsGwTKN9RfKxNL3qJmfGS3w\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p>Week 11<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1tWi3hiTytL4NxW8k34yc33bOhyJ7D_pPftQaWKi-XIE\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1tWi3hiTytL4NxW8k34yc33bOhyJ7D_pPftQaWKi-XIE\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1HzFr8ZAWOcX2BIjHQT5t3FzTTa4eY0A_KJIORskaw4w\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1HzFr8ZAWOcX2BIjHQT5t3FzTTa4eY0A_KJIORskaw4w\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p>Week 12<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1j2J58GvkP-QpPgaMze5Hm-rUSfKADOTx1djqW73jSE4\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1j2J58GvkP-QpPgaMze5Hm-rUSfKADOTx1djqW73jSE4\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p>Week 13<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1yrr0HDLXnXNGLPx99E1Jh8sTixem9WOydynXWivICl4\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1yrr0HDLXnXNGLPx99E1Jh8sTixem9WOydynXWivICl4\/edit?usp=sharing<\/a><\/p>\n\n\n\n<p>Week 15<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/12xLLUoLAgfLsRTktl7p27QwLm0BdYS2ookVV5oVkhDk\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/12xLLUoLAgfLsRTktl7p27QwLm0BdYS2ookVV5oVkhDk\/edit?usp=sharing<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">Articles<\/a><\/div>\n<\/div>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1xi6Rr5GzamtU8wWWrFnDvM-0CWFLwNHu-0kTWGWgAWE\/edit?tab=t.0\">https:\/\/docs.google.com\/document\/d\/1xi6Rr5GzamtU8wWWrFnDvM-0CWFLwNHu-0kTWGWgAWE\/edit?tab=t.0<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">career Paper<\/a><\/div>\n<\/div>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1K67dYyLh-oBAi1Q7d6A3WY5nulDW5n_wLg4mA_hDyAU\/edit?tab=t.0\">https:\/\/docs.google.com\/document\/d\/1K67dYyLh-oBAi1Q7d6A3WY5nulDW5n_wLg4mA_hDyAU\/edit?tab=t.0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Science and cybersecurity share a foundation in observation, experimentation, and evidence-based reasoning. Both disciplines aim to solve problems, predict outcomes, and develop new solutions based on logical analysis. By applying the principles of science, cybersecurity professionals can better understand, anticipate, and counteract evolving threats while continually enhancing the reliability and resilience of digital systems. Week&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mharr094\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":29862,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/users\/29862"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/pages\/141\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mharr094\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}