{"id":58,"date":"2024-08-05T01:02:23","date_gmt":"2024-08-05T01:02:23","guid":{"rendered":"https:\/\/student.wp.odu.edu\/atrev004\/?p=58"},"modified":"2024-08-05T01:02:23","modified_gmt":"2024-08-05T01:02:23","slug":"module-10-journal-entry-2","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/module-10-journal-entry-2\/","title":{"rendered":"Module 10 Journal Entry 2"},"content":{"rendered":"\n<p>Alexander Trevino<br>Professor Umphlet<br>CYSE201S<br>Due: July 14, 2024<br>Module 10 Journal Entry 2<br>The article emphasizes the need for a new approach to cybersecurity that focuses on protecting<br>societal behaviors manipulated via cyber means. Unlike traditional cybersecurity, which protects<br>information systems, social cybersecurity aims to safeguard societal cohesion and trust.<br>A significant point is the use of information warfare to destabilize societies. The authors<br>illustrate how state and nonstate actors exploit digital platforms to spread disinformation and<br>create discord. Russia&#8217;s &#8220;information blitzkrieg&#8221; exemplifies this, using sophisticated techniques<br>to manipulate public opinion and foster internal divisions.<br>Social cybersecurity requires an interdisciplinary approach, combining political science,<br>sociology, communication, and technology. Tools like network analysis and machine learning<br>are essential for identifying and combating these threats. The article underscores the strategic<br>importance of integrating social cybersecurity into military and governmental strategies to<br>protect societal values and ensure resilience against cyber disruptions.<br>Furthermore, the psychological and societal impacts of cyber threats are profound.<br>Disinformation can increase public anxiety, fear, and mistrust. Cybersecurity analysts play a<br>crucial role in mitigating these impacts by protecting information integrity and fostering<br>community security. This also emphasizes the need for public education on cybersecurity<br>practices to help individuals protect themselves.<br>Trevino2<br>In conclusion, the article advocates for a comprehensive approach to cybersecurity that includes<br>protecting societal trust and cohesion. By addressing the manipulation of social behaviors<br>through cyber means, we can better defend against strategic threats posed by information<br>warfare, ensuring national security in the digital age. Social cybersecurity is not just a technical<br>challenge but a crucial aspect of maintaining the stability and security of our society.<br>Trevino3<br>References<br>Beskow, D. M., &amp; Carley, K. M. (2019). Social Cybersecurity: An Emerging National Security<br>Requirement. Military Review. Retrieved from<br>https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-<br>2019\/117-Cybersecurity\/b\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alexander TrevinoProfessor UmphletCYSE201SDue: July 14, 2024Module 10 Journal Entry 2The article emphasizes the need for a new approach to cybersecurity that focuses on protectingsocietal behaviors manipulated via cyber means. Unlike traditional cybersecurity, which protectsinformation systems, social cybersecurity aims to safeguard&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/module-10-journal-entry-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26774,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/58"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/users\/26774"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"predecessor-version":[{"id":59,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/58\/revisions\/59"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}