
{"id":74,"date":"2023-11-16T17:22:49","date_gmt":"2023-11-16T17:22:49","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cjudy002\/?p=74"},"modified":"2025-02-23T23:18:34","modified_gmt":"2025-02-23T23:18:34","slug":"cyse-201s-journal-10b-write-a-paragraph-describing-social-themes-that-arise-in-the-presentation","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/cjudy002\/2023\/11\/16\/cyse-201s-journal-10b-write-a-paragraph-describing-social-themes-that-arise-in-the-presentation\/","title":{"rendered":"CYSE 201S Journal 10b: Write a paragraph describing social themes that arise in the presentation"},"content":{"rendered":"\n<p>After watching the video, I thought of several social themes that are related to her video about cybersecurity analysts. First, she mentions at the beginning of the video, in the segment \u201cWhat is a Cybersecurity Analyst\u201d, that cybersecurity analysts (CA\u2019s) are the first line of defense, and they respond to cybersecurity incidents. The social theme that arises here is that in order to respond to an incident, you have to think like a cybercriminal, as discussed in earlier modules. Thinking like a cybercriminal is crucial in assessing an incident and learning from the incident to make better security protocols. Additionally, she also goes on to mention how CA\u2019s typically start off as a cybersecurity \u201chelp desk\u201d, typically responding to phishing attacks. This made me think of what we discussed in module 5, the psychological role of victims in cybersecurity incidents. We discussed the Big Five personality traits, and the trait agreeableness was described as \u201cincreasing vulnerability to phishing as individuals might share information with potential hackers\u201d. This can be used by a CA to better understand how to respond to phishing attacks, and it can be used by a CA to warn other employees and individuals about the dangers of phishing attacks.<\/p>\n\n\n\n<p>link to video: https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After watching the video, I thought of several social themes that are related to her video about cybersecurity analysts. First,<\/p>\n<div class=\"read-button read_more_btn_text\"><a class=\"read_more\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/2023\/11\/16\/cyse-201s-journal-10b-write-a-paragraph-describing-social-themes-that-arise-in-the-presentation\/\">Read Now<span class=\"arrow_readm\"> &#x25BA;<\/span><\/a><\/div>\n","protected":false},"author":25776,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/posts\/74"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/users\/25776"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/posts\/74\/revisions"}],"predecessor-version":[{"id":75,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/posts\/74\/revisions\/75"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/media?parent=74"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/categories?post=74"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/tags?post=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}