{"id":295,"date":"2024-01-31T18:28:00","date_gmt":"2024-01-31T18:28:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shadowyseth\/?page_id=295"},"modified":"2024-01-31T18:28:00","modified_gmt":"2024-01-31T18:28:00","slug":"journal-entry-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shadowyseth\/journal-entry-1\/","title":{"rendered":"Journal Entry 1"},"content":{"rendered":"\n<p>   I want to focus on analyzing. The reason I picked this is because It is important for<br>cybersecurity and it can be used to analyze information that coming in. This area focuses on<br>analyzing all sources and can collect information like exploitation of the information. This can<br>also show the target like regions, countries, non-state entities, and technologies they used to<br>send the information to us. With this information, we can analyze if it was a threat or not with<br>information and see if we need to find help or support law enforcement for the threat. With all<br>this, I think this is the most important to me when it comes to an area because if you don&#8217;t<br>analyze the information. Then everything can go wrong due to human error and technologies<br>can be vulnerable and can be exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I want to focus on analyzing. The reason I picked this is because It is important forcybersecurity and it can be used to analyze information that coming in. This area focuses onanalyzing all sources and can collect information like exploitation of the information. This canalso show the target like regions, countries, non-state entities, and technologies&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shadowyseth\/journal-entry-1\/\">Read More<\/a><\/div>\n","protected":false},"author":28348,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/users\/28348"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/media?parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}