{"id":5,"date":"2021-03-03T23:53:07","date_gmt":"2021-03-03T23:53:07","guid":{"rendered":"https:\/\/student.wp.odu.edu\/efais001\/?p=5"},"modified":"2021-03-03T23:53:07","modified_gmt":"2021-03-03T23:53:07","slug":"how-does-my-major-relate-to-cybersecurity-technology","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/efais001\/2021\/03\/03\/how-does-my-major-relate-to-cybersecurity-technology\/","title":{"rendered":"How does my major relate to cybersecurity technology?"},"content":{"rendered":"\n<p>Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Cybersecurity refers to the body of technology. Cybersecurity can be about so much more than just technology. Some might say the real key to it is psychology (my major). The one thing throughout the means of cybersecurity that can tend to be a weak link in the system is people. When employing a staff of people it&#8217;s important to not only seek the skills to uphold the infrastructure but to try and understand how their mind works. Can they keep their work life and personal life separate ? Can they operate under pressure ? Can you trust them to work out some kinks in the system ? A number of factors go into it. People can easily compromise a company&#8217;s security system and not even know it. Most people with a job in this field will try very hard to make sure all of their data is secure and accurate. Because of that they can sometimes overwork themselves and possibly risk leaking data. Behavior can also play a role in the cybersecurity field as well. Again with understanding the human mind and how it works, it&#8217;s important to remember that sometimes you can&#8217;t help how you react or feel about certain things. But it should be required that each staff member see a professional for behavioral evaluation. Acting out at work can automatically make you a risk for the company and you could possibly no longer be trusted with the companies data. By understanding how people act and react you can better prepare yourself and your company from future leaks. It is important to have a positive attitude towards your staff and establish trust. You take every measure possible to help them but to also set forth work policies to make sure they are more than capable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Cybersecurity refers to the body of technology. Cybersecurity can be about so much more than just technology. Some might say the real key to it is psychology&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/efais001\/2021\/03\/03\/how-does-my-major-relate-to-cybersecurity-technology\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":20069,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/posts\/5"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/users\/20069"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/posts\/5\/revisions"}],"predecessor-version":[{"id":6,"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/posts\/5\/revisions\/6"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/categories?post=5"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/efais001\/wp-json\/wp\/v2\/tags?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}