{"id":231,"date":"2024-03-25T23:39:02","date_gmt":"2024-03-25T23:39:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mthom062\/?p=231"},"modified":"2024-03-25T23:39:02","modified_gmt":"2024-03-25T23:39:02","slug":"journal-entry-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mthom062\/2024\/03\/25\/journal-entry-11\/","title":{"rendered":"Journal Entry #11"},"content":{"rendered":"\n<p>A cybersecurity analyst job relates to social behaviors in many different ways. Cyber Security analyst jobs intersect with social behaviors in many ways highlighting the importance of understanding human psychology and sociology. Many cybersecurity analysts jobs require candidates to have skills such as technical and social skills. A cyber defense worker needs to consider all the ways they can be exploited by a malicious attacker and be able to communicate effectively. Cybersecurity analysts often study behavior to detect and prevent security threats, by understanding how individuals interact with technology and how they compromise security systems they can develop better policies and implement better protection. Cyber Security analysts jobs especially in D.C. for the government are the largest vulnerabilities on any network and can do irreparable damage leading to catastrophic events in America. Cybersecuirty candidates must be loyal (civic duty) to the ideals of the country and organization that they belong to. The sensitivity and secrecy of the data must be entrusted and never leaked to unauthorized persons, which is why many government agencies require clearances to be able to work for them. These can be hard to obtain, but are needed for national security.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cybersecurity analyst job relates to social behaviors in many different ways. Cyber Security analyst jobs intersect with social behaviors in many ways highlighting the importance of understanding human psychology and sociology. Many cybersecurity analysts jobs require candidates to have&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/mthom062\/2024\/03\/25\/journal-entry-11\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28326,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/posts\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/users\/28326"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/posts\/231\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/posts\/231\/revisions\/232"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/media?parent=231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/categories?post=231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mthom062\/wp-json\/wp\/v2\/tags?post=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}