{"id":308,"date":"2025-08-01T00:02:25","date_gmt":"2025-08-01T00:02:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rlee\/?p=308"},"modified":"2025-08-01T00:03:46","modified_gmt":"2025-08-01T00:03:46","slug":"title-scientific-principles-in-cybersecurity-understanding-the-principles-of-science-helps-explain-how-cybersecurity-works-in-the-real-world","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rlee\/2025\/08\/01\/title-scientific-principles-in-cybersecurity-understanding-the-principles-of-science-helps-explain-how-cybersecurity-works-in-the-real-world\/","title":{"rendered":"Title: Scientific Principles in Cybersecurity Understanding the principles of science helps explain how cybersecurity works in the real world."},"content":{"rendered":"CYSE 201S Journal Entry<br \/>Name: Ramon Lee<br \/>Date: 05\/29\/25<br \/>Journal Title: Scientific Principles in Cybersecurity<br \/>Understanding the principles of science helps explain how cybersecurity works in the real world.<br \/>These principles guide how we analyze threats, respond to attacks, and protect systems.<br \/>Relativism means that truth depends on the situation. In cybersecurity, this appears when<br \/>different organizations define &#8220;risk&#8221; differently based on what they need to protect.<br \/>Objectivity means focusing on facts and evidence. Cybersecurity professionals use system logs<br \/>and digital traces to analyze incidents, not assumptions or personal bias.<br \/>Parsimony is about choosing the simplest explanation that fits the facts. For example, if an<br \/>account is breached, a weak password is a more likely reason than a state-sponsored hack.<br \/>Skepticism keeps professionals from blindly trusting alerts or claims. Instead, they verify and<br \/>investigate before acting, helping prevent false alarms or mistakes.<br \/>Ethical neutrality means analyzing without judging. Studying hacker behavior is not about<br \/>supporting it, but understanding it so defenders can build better protections.<br \/>Determinism means every effect has a cause. A system doesn\u2019t crash randomly\u2014there\u2019s always<br \/>a reason, like malware, a bug, or a security gap.<br \/>Replicability ensures that results can be repeated. If a security test finds a vulnerability, running<br \/>it again under the same conditions should show the same weakness.<br \/>These principles support better cybersecurity by encouraging professionals to think critically,<br \/>rely on facts, and always look deeper for causes.<br \/>References<br \/>Moss, R. (2022). Cybersecurity and Scientific Principles. ODU Cybersecurity Blog.<br \/>Tupa, L. (2022). Cybersecurity: Relation to Principles of Science. ODU Student Site.<br \/>National Institute of Standards and Technology. (2018). Framework for Improving Critical<br \/>Infrastructure Cybersecurity. NIST.<br \/>Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control<br \/>Your World. W.W. Norton &amp; Company.<br \/>Andress, J. (2019). The Basics of Information Security (3rd ed.). Syngress","protected":false},"excerpt":{"rendered":"<p>CYSE 201S Journal EntryName: Ramon LeeDate: 05\/29\/25Journal Title: Scientific Principles in CybersecurityUnderstanding the principles of science helps explain how cybersecurity works in the real world.These principles guide how we analyze threats, respond to attacks, and protect systems.Relativism means that truth depends on the situation. In cybersecurity, this appears whendifferent organizations define &#8220;risk&#8221; differently based on&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rlee\/2025\/08\/01\/title-scientific-principles-in-cybersecurity-understanding-the-principles-of-science-helps-explain-how-cybersecurity-works-in-the-real-world\/\">Read More<\/a><\/div>\n","protected":false},"author":30933,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/308"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/users\/30933"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/308\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/308\/revisions\/343"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/categories?post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/tags?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}