{"id":340,"date":"2024-12-08T19:43:38","date_gmt":"2024-12-08T19:43:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/?page_id=340"},"modified":"2024-12-08T19:53:34","modified_gmt":"2024-12-08T19:53:34","slug":"journal-11","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/journal-11\/","title":{"rendered":"Journal 11"},"content":{"rendered":"\n<p>Question: Watch this\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">videoLinks to an external site.<\/a>.\u00a0 As you watch the video<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an external site.<\/a><\/p>\n\n\n\n<p>A cybersecurity analyst\u2019s job is closely connected to social behaviors because they need to<br>understand how people can unintentionally create security risks. One common social theme is<br>social engineering, where attackers trick people into revealing sensitive information. Analysts<br>also consider how trust and social habits, like weak passwords or ignoring security warnings,<br>can make systems vulnerable. Cultural differences can impact how people follow security rules,<br>so analysts must be aware of these behaviors. Another important area is misinformation, where<br>false information is spread to confuse or manipulate people, which can create bigger<br>cybersecurity threats. Analysts work to protect against these risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Question: Watch this\u00a0videoLinks to an external site..\u00a0 As you watch the videohttps:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an external site. A cybersecurity analyst\u2019s job is closely connected to social behaviors because they need tounderstand how people can unintentionally create security risks. One common social theme issocial engineering, where attackers trick people into revealing sensitive information. Analystsalso consider how trust&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/journal-11\/\">Read More<\/a><\/div>\n","protected":false},"author":29366,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/340"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/users\/29366"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/340\/revisions"}],"predecessor-version":[{"id":389,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/340\/revisions\/389"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/media?parent=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}