{"id":392,"date":"2025-04-29T01:09:34","date_gmt":"2025-04-29T01:09:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/?p=392"},"modified":"2025-04-29T01:33:08","modified_gmt":"2025-04-29T01:33:08","slug":"discussion-board-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2025\/04\/29\/discussion-board-2\/","title":{"rendered":"Discussion Board #2"},"content":{"rendered":"\n<p>For starters, determinism is a principle that acknowledges all behaviors as resulting from previous actions or events that are predictable. The principle of determinism relates to computer hacking because it is a predictable action of an individual with malicious intent who deliberately accesses a computer system using tools they purposefully acquired. These cyber attackers always utilize hacking tools and exploits to take advantage of vulnerabilities within computer systems, making these attacks predictable but not always preventable. An example of this would be the Olympic Destroyer in the 2018 Winter Olympics, where a Russian hacking group took over the IT systems for the 2018 Winter Olympics because they were not happy with Russia\u2019s being banned from participating in doping. This attack could have been predicted before the 2018 Winter Olympics began because the Worldwide Anti-Doping Agency, the agency that banned Russia, was hacked by Russian hackers and had documents leaked or stolen to make the organization look bad. This petty attack was passed over too quickly, so people didn\u2019t think it could result in a much bigger and more serious attack from the same group. This demonstrates that computer hackers reflect determinism, especially in the case of the 2018 Winter Olympics, because they are influenced by either the power of their exploits and tools or another agenda, like politics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For starters, determinism is a principle that acknowledges all behaviors as resulting from previous actions or events that are predictable. The principle of determinism relates to computer hacking because it is a predictable action of an individual with malicious intent who deliberately accesses a computer system using tools they purposefully acquired. These cyber attackers always&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2025\/04\/29\/discussion-board-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27461,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/392"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/users\/27461"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/392\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/392\/revisions\/393"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/media?parent=392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/categories?post=392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/tags?post=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}