{"id":296,"date":"2024-09-12T01:31:17","date_gmt":"2024-09-12T01:31:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/njomimukete1\/?p=296"},"modified":"2024-12-07T07:29:23","modified_gmt":"2024-12-07T07:29:23","slug":"week-2-journal-entry-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/njomimukete1\/2024\/09\/12\/week-2-journal-entry-2\/","title":{"rendered":"Week 2 &#8211; Journal Entry 2"},"content":{"rendered":"\n<p>Cyber security is also a scientific field \u2014 albeit one that must be examined with observe-hypothesize-experiment-analyze. Experts related to security and cybersecurity are capable of comporting such as standard operating systems behaviors prior learn what its threat nature is- configured this performs an abnormal behavior. First they hypothesis about what&#8217;s that threat vectors and perhaps where it could be, before finally designing the test experiments (aka security tests in this context aka penetration tests) to prove their hypotheses.<\/p>\n\n\n\n<p>This information is analyzed to ensure harder defensive measures are set in place. It is the R&amp;D level scientific method for cybersecurity strategies supported by empirical evidence and tested methodology, showing security regime has actually improved a lot with proven deliverables against cyber threat. ENACT \u2014 as in the NICE Workforce Framework for Cybersecurity &#8220;Analyze,&#8221; but honed on parsing this data Related to the cyber score Register Here <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is also a scientific field \u2014 albeit one that must be examined with observe-hypothesize-experiment-analyze. Experts related to security and cybersecurity are capable of comporting such as standard operating systems behaviors prior learn what its threat nature is- configured this performs an abnormal behavior. First they hypothesis about what&#8217;s that threat vectors and perhaps&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/njomimukete1\/2024\/09\/12\/week-2-journal-entry-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28606,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/users\/28606"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}