{"id":369,"date":"2024-12-02T19:47:31","date_gmt":"2024-12-02T19:47:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nmele002\/?page_id=369"},"modified":"2024-12-02T19:47:31","modified_gmt":"2024-12-02T19:47:31","slug":"journal-11","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nmele002\/journal-11\/","title":{"rendered":"journal 11"},"content":{"rendered":"\n<p>The role of a cybersecurity analyst, while primarily focused on protecting systems from digital<br>threats, inherently intersects with social behaviors. Cybersecurity analysts often analyze<br>cyberattack patterns that exploit human vulnerabilities, such as phishing schemes, social<br>engineering, and misinformation campaigns. These attacks rely on understanding human<br>psychology and social dynamics\u2014knowing how people think, what might prompt them to click a<br>link, or how to exploit trust within social networks. As a result, cybersecurity analysts must have<br>technical skills and an awareness of social behavior patterns and vulnerabilities. Social themes<br>like trust, influence, and risk perception play a significant role, as attackers often aim to<br>manipulate these factors to bypass technical defenses. In essence, a cybersecurity analyst<br>must understand the &#8220;human layer&#8221; of security, as protecting systems is increasingly about<br>recognizing and mitigating socially engineered threats that exploit psychological tendencies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The role of a cybersecurity analyst, while primarily focused on protecting systems from digitalthreats, inherently intersects with social behaviors. Cybersecurity analysts often analyzecyberattack patterns that exploit human vulnerabilities, such as phishing schemes, socialengineering, and misinformation campaigns. These attacks rely on understanding humanpsychology and social dynamics\u2014knowing how people think, what might prompt them to click alink,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nmele002\/journal-11\/\">Read More<\/a><\/div>\n","protected":false},"author":28358,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/pages\/369"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/users\/28358"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/pages\/369\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/pages\/369\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nmele002\/wp-json\/wp\/v2\/media?parent=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}