{"id":33,"date":"2024-12-09T04:27:07","date_gmt":"2024-12-09T04:27:07","guid":{"rendered":"https:\/\/student.wp.odu.edu\/mston011\/?p=33"},"modified":"2024-12-09T04:27:07","modified_gmt":"2024-12-09T04:27:07","slug":"journal-entry-2","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/mston011\/2024\/12\/09\/journal-entry-2\/","title":{"rendered":"journal entry 2"},"content":{"rendered":"\n<p>Science and cybersecurity, they\u2019re way more connected than you\u2019d think as science is all about discovering patterns while testing theories and figuring out why stuff happens. Well, cybersecurity\u2019s the same. Experts are constantly watching network activity, looking for anything weird or out of place, and trying out different defenses like they\u2019re running experiments as a person in a lab would. They gotta think critically, analyze data, and problem-solve like most researchers do and the two are connected more than most people might think.<\/p>\n\n\n\n<p>And it\u2019s not just random guesses these cybersecurity specialists are doing, they\u2019re methodical and they run tests, gathering data, tweaking strategies until a hacker finds a hole in the system the cybersecurity team has to&nbsp; break it down and patch it up using that same scientific mindset. It\u2019s like an ongoing battle, but with a lot of trial and error, research and a bit of creativity. So science definatilly powers the way we defend against cyberattacks turning the chaos of hacking into something we can understand and fight back against.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Science and cybersecurity, they\u2019re way more connected than you\u2019d think as science is all about discovering patterns while testing theories and figuring out why stuff happens. Well, cybersecurity\u2019s the same. Experts are constantly watching network activity, looking for anything weird&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/mston011\/2024\/12\/09\/journal-entry-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":23864,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts\/33"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/users\/23864"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":34,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts\/33\/revisions\/34"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}