{"id":204,"date":"2014-06-22T16:32:27","date_gmt":"2014-06-22T22:32:27","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=204"},"modified":"2021-08-30T13:09:47","modified_gmt":"2021-08-30T19:09:47","slug":"before-you-hit-your-head-against-a-wall","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2014\/06\/22\/before-you-hit-your-head-against-a-wall\/","title":{"rendered":"Before You Hit Your Head Against a Wall"},"content":{"rendered":"<p>As both an educator and a security professional, I often see people who get frustrated.\u00a0 It could be with a school or work assignment.\u00a0 To help reduce frustration, here are some words of advice:<\/p>\n<ul>\n<li>DON&#8217;T PANIC. This is my first rule of incident response. Getting all worked up never solves the problem. Take a deep breath or a time-out if needed and then proceed.<\/li>\n<li>Understand &#8220;Who Owns the Headache?&#8221;\u00a0 So often, we get frustrated with things outside of our realm of control. Basically, we try to fix things that we can&#8217;t because we don&#8217;t have control or &#8220;Own the Headache.&#8221;\u00a0 Acknowledge what you can control and what you can&#8217;t.\u00a0 Only focus on the things you can.<\/li>\n<li>Research it. Ask yourself: Is this information available from an Internet source (iow, Google it)? One thing hammered into me when I was in ROTC was &#8220;use your resources.&#8221; You don&#8217;t need to know everything. You just need to know how to find the information and then use it intelligently.<\/li>\n<li>Look at the problem from a different perspective. Is there another way to solve the problem? In computers, there&#8217;s usually at least 2, if not many more ways to solve any problem. That&#8217;s why I don&#8217;t usually have a set answer in mind. You may think of something I haven&#8217;t that works just as well.<\/li>\n<li>Take a time out. Step away from the problem for a little while. Sometimes they resolve themselves, as in the case with bellevue.edu being down. Sometimes, it will give you a chance to think about it and think it through. This also gives your subconscious some time to process and develop a solution. (Have you ever had a &#8220;duh, I should&#8217;ve thought of that&#8221; moment?)<\/li>\n<li>Ask someone. A person is also a resource (see use your resources above). First try a fellow classmate or colleague. I love it when students work together and help each other to solve problems. The student&#8217;s who collaborate get bonus points in my book. It&#8217;s truly a win-win for everyone. This is also part of my personal mantra, &#8220;By helping each other, we&#8217;re all smarter\/stronger\/better.&#8221;<\/li>\n<li>Ask good questions. If no one else has the answer (about an assignment), then ask your professor or your boss. If something&#8217;s not clear, then ask for clarification. In today&#8217;s world, it&#8217;s not the answers you have, but the questions you ask. Come up with good questions, then be bold and ask them.<\/li>\n<\/ul>\n<p>The idea is to prevent frustration, which inhibits learning and growth.<\/p>\n<p>Coach Ron<br \/>\n\u201cEvery man&#8230;should periodically be compelled to listen to opinions which are infuriating to him. To hear nothing but what is pleasing to one is to make a pillow of the mind.\u201d St. John Ervine<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As both an educator and a security professional, I often see people who get frustrated.\u00a0 It could be with a school or work assignment.\u00a0 To help reduce frustration, here are some words of advice: DON&#8217;T PANIC. This is my first rule of incident response. Getting all worked up never solves the problem. Take a deep [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-204","post","type-post","status-publish","format-standard","hentry","category-security-education"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=204"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/204\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/204\/revisions\/205"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}