{"id":296,"date":"2025-08-09T00:52:53","date_gmt":"2025-08-09T00:52:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pierceferguson\/?p=296"},"modified":"2025-08-09T00:52:53","modified_gmt":"2025-08-09T00:52:53","slug":"module-2-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pierceferguson\/2025\/08\/09\/module-2-journal-entry\/","title":{"rendered":"Module 2 Journal Entry"},"content":{"rendered":"\n<p>There are seven principles of science: Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, Determinism, and Skepticism. Each principle has its level of depth that can be explored and discussed for ages. However, these principles also relate to the realm of cybersecurity. Within this essay, definitions will be given for each principle with an example of how they correlate with cybersecurity.<br><br>Relativism is a complex principle, but it essentially means that all things are related to one another in terms of their relativity. There are no coincidences, and every point of view, no matter how trivial or knowledgeable, is meaningful. An example of this in cybersecurity would be how the treatment of a company\u2019s employees relates to its vulnerability to a cyberattack.<br><br>Objectivity means the absolute point of view of things. Removed from opinions, subjectivity, and external factors, only the facts that are necessary to advance science are allowed. An example of this in cybersecurity would be researching information based on facts and truth that have been tested and proven to be correct. <br><br>Parsimony is the idea of keeping explanations simple. A form of parsimony that one might have heard of before would be Occam\u2019s Razor, an idea that means that the simplest answer to a problem is the best answer; all other complicated answers shouldn\u2019t be considered. Although human emotions cannot easily be rationalized with a simple answer, it doesn\u2019t mean that it is impossible. An example of this in cybersecurity would be identifying the simplest solutions and answers to a cyberattack, as well as understanding why a hacker might commit such an attack.<br><br>Empiricism is the idea that subject matters can only be studied if they appeal to our five senses and our overall experiences. Experiences are one of the dominant ways people learn, and the same thing can be said for science. An example of this in cybersecurity would be relying on true and tested ideas and not on people\u2019s guesses for learning more about cybersecurity.<br><br>Ethical Neutrality is the belief that all practices and tests should have a moral standard. An example of this in cybersecurity would be conducting tests that are humane and don\u2019t invade a specific group\u2019s privacy and safety.<br><br>Determinism, in summary, would be the cause and effect of things and how our actions and choices stem from our previous actions and choices. An example of this in cybersecurity would be understanding a hacker\u2019s motive, environment, and history, which led them to cause a cyberattack to begin with.<br><br>Lastly, Skepticism is the belief that one should always question all available information, for not all things are absolute. An example of this in cybersecurity would be questioning and testing the framework of a company\u2019s cybersecurity program or questioning the legitimacy of a cyberattack investigation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are seven principles of science: Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, Determinism, and Skepticism. Each principle has its level of depth that can be explored and discussed for ages. However, these principles also relate to the realm of cybersecurity. Within this essay, definitions will be given for each principle with an example of how&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pierceferguson\/2025\/08\/09\/module-2-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":30972,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/users\/30972"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/296\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}