{"id":1,"date":"2025-09-15T00:53:09","date_gmt":"2025-09-15T00:53:09","guid":{"rendered":"https:\/\/student.wp.odu.edu\/nfull005\/?p=1"},"modified":"2025-09-15T02:16:46","modified_gmt":"2025-09-15T02:16:46","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/nfull005\/2025\/09\/15\/hello-world\/","title":{"rendered":"My thoughts on Cybersecurity"},"content":{"rendered":"\n<p>The question to answer before we get to my thought on Cybersecurity is: What is Cybersecurity?<\/p>\n\n\n\n<p>When thinking of Cybersecurity, you may immediately think of hackers.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"http:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/360_F_550958748_OeGcRonEUNoVhd0wjd9zSEMhLFIGO9Bt.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/360_F_550958748_OeGcRonEUNoVhd0wjd9zSEMhLFIGO9Bt-300x200.jpg\" alt=\"\" class=\"wp-image-17\" style=\"width:301px;height:auto\" srcset=\"https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/360_F_550958748_OeGcRonEUNoVhd0wjd9zSEMhLFIGO9Bt-300x200.jpg 300w, https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/360_F_550958748_OeGcRonEUNoVhd0wjd9zSEMhLFIGO9Bt.jpg 540w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n\n\n\n<p>People trying to &#8220;hack into the mainframe&#8221; or causing a security breach are often what&#8217;s shown in movies, right? However, Cybersecurity isn&#8217;t necessarily the act of hacking. According to <a href=\"https:\/\/www.ibm.com\/think\/topics\/cybersecurity\">Gregg from IBM<\/a>, &#8220;Cybersecurity is the practice of protecting people, systems and data from cyberattacks by using various technologies, processes and policies.&#8221;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><a href=\"http:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto-300x169.jpg\" alt=\"\" class=\"wp-image-18\" srcset=\"https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto-300x169.jpg 300w, https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto-1024x576.jpg 1024w, https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto-768x432.jpg 768w, https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto-600x338.jpg 600w, https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto-945x532.jpg 945w, https:\/\/student.wp.odu.edu\/nfull005\/wp-content\/uploads\/sites\/39649\/2025\/09\/cybersecurity_NicoElNino-AlamyStockPhoto.jpg 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n<p>Cybersecurity, to me, is a powerful career path created in order to protect people and businesses from having their information accessed by unwanted persons. <\/p>\n\n\n\n<p>With that, however, there must be research on different topics in Cybersecurity. After all, there must be research to improve on the systems currently in place. Social Science plays a big role in Cybersecurity.<\/p>\n\n\n\n<p>With social sciences, I initially didn&#8217;t think it had much to do with Cybersecurity. I was stuck on the fact that Cybersecurity is a tech driven career. My thoughts were that with Cybersecurity, I didn&#8217;t have to think about that because all I was focused on was coding and using different programs to keep the systems safe. However, we have to understand people&#8217;s behaviors and thought processes in order to pinpoint what systems and information are the most desirable for breaches. That is the point of Social Sciences. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The question to answer before we get to my thought on Cybersecurity is: What is Cybersecurity? When thinking of Cybersecurity, you may immediately think of hackers. People trying to &#8220;hack into the mainframe&#8221; or causing a security breach are often&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/nfull005\/2025\/09\/15\/hello-world\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31434,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/users\/31434"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":3,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":21,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/posts\/1\/revisions\/21"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}