{"id":392,"date":"2025-03-03T00:36:33","date_gmt":"2025-03-03T00:36:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/?page_id=392"},"modified":"2025-03-03T00:45:47","modified_gmt":"2025-03-03T00:45:47","slug":"journal-entry-7","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/journal-entry-7\/","title":{"rendered":"Journal Entry 7"},"content":{"rendered":"\n<p><strong>(Programmer Thinking Deeply)<\/strong> &#8211; <a href=\"https:\/\/unsplash.com\/photos\/male-programmer-working-on-desktop-computer-with-many-monitors-at-office-in-software-develop-company-website-design-programming-and-coding-technologies-fxtpTGech0M\" data-type=\"link\" data-id=\"https:\/\/unsplash.com\/photos\/male-programmer-working-on-desktop-computer-with-many-monitors-at-office-in-software-develop-company-website-design-programming-and-coding-technologies-fxtpTGech0M\">https:\/\/unsplash.com\/photos\/male-programmer-working-on-desktop-computer-with-many-monitors-at-office-in-software-develop-company-website-design-programming-and-coding-technologies-fxtpTGech0M<\/a><\/p>\n\n\n\n<p>&#8220;Did I just go live to production. or was it the test server? ????&#8221;<\/p>\n\n\n\n<p><br>Explanation:<br>This programmer appears to be lost in thought, maybe reading code or debugging. In a people-centric cybersecurity approach, this is cognitive workload\u2014when individuals are distracted or overloaded, they can make mistakes that introduce security risks (e.g., releasing untested code, setting security settings incorrectly).<\/p>\n\n\n\n<p><br><strong>(Hacker at Work)<\/strong> &#8211; <a href=\"https:\/\/unsplash.com\/photos\/the-young-dangerous-hacker-breaks-down-government-services-by-downloading-sensitive-data-and-activating-viruses-a-man-uses-a-laptop-computer-with-many-monitors-mxn_SzTwdBU\" data-type=\"link\" data-id=\"https:\/\/unsplash.com\/photos\/the-young-dangerous-hacker-breaks-down-government-services-by-downloading-sensitive-data-and-activating-viruses-a-man-uses-a-laptop-computer-with-many-monitors-mxn_SzTwdBU\">https:\/\/unsplash.com\/photos\/the-young-dangerous-hacker-breaks-down-government-services-by-downloading-sensitive-data-and-activating-viruses-a-man-uses-a-laptop-computer-with-many-monitors-mxn_SzTwdBU<\/a><\/p>\n\n\n\n<p>&#8220;When you finally hack into the system\u2026 but it was just your own Wi-Fi.&#8221;<\/p>\n\n\n\n<p><br>Explanation:<br>The person in this image is hacking or penetration testing. Human-centered cybersecurity realizes that there is both malicious and ethical hacking, and security must be usability-oriented\u2014enabling ethical users to test for weakness without enabling unauthorized access.<\/p>\n\n\n\n<p><br><strong>(Person Surfing Social Media)<\/strong> &#8211; <a href=\"https:\/\/unsplash.com\/photos\/person-holding-silver-iphone-6-BXiLSwwvqrY\" data-type=\"link\" data-id=\"https:\/\/unsplash.com\/photos\/person-holding-silver-iphone-6-BXiLSwwvqrY\">https:\/\/unsplash.com\/photos\/person-holding-silver-iphone-6-BXiLSwwvqrY<\/a><br>&#8220;Me: I don\u2019t post personal stuff online. Also me: Posts whole life on Instagram.&#8221;<\/p>\n\n\n\n<p><br>Explanation:<br>The person is browsing social media, maybe engaging with personal content. This meme is highlighting a common cybersecurity issue\u2014people believe they are privacy-conscious but unknowingly leave sensitive data online. Human-centric cybersecurity must address behavioral patterns and increase awareness on how to manage digital footprints.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Programmer Thinking Deeply) &#8211; https:\/\/unsplash.com\/photos\/male-programmer-working-on-desktop-computer-with-many-monitors-at-office-in-software-develop-company-website-design-programming-and-coding-technologies-fxtpTGech0M &#8220;Did I just go live to production. or was it the test server? ????&#8221; Explanation:This programmer appears to be lost in thought, maybe reading code or debugging. In a people-centric cybersecurity approach, this is cognitive workload\u2014when individuals are distracted or overloaded, they can make mistakes that introduce security risks (e.g.,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/journal-entry-7\/\">Read More<\/a><\/div>\n","protected":false},"author":30365,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages\/392"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/users\/30365"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages\/392\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages\/392\/revisions\/398"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/media?parent=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}