{"id":237,"date":"2026-04-23T19:42:02","date_gmt":"2026-04-23T19:42:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alewi073\/?p=237"},"modified":"2026-04-23T19:42:02","modified_gmt":"2026-04-23T19:42:02","slug":"journal-entry-week-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/23\/journal-entry-week-7\/","title":{"rendered":"Journal Entry &#8211; Week #7"},"content":{"rendered":"\n<p>Photo #8:<\/p>\n\n\n\n<p>Meme: &#8220;When the system says &#8216;create a strong password with 12 characters, symbols, and numbers&#8217; and now you have to remember it without writing it down.&#8221;<\/p>\n\n\n\n<p>Explanation:<\/p>\n\n\n\n<p>This relates to human centered cyber security because security systems are often designed to be very strict, but they don&#8217;t always consider how people actually behave. When passwords become too complicated, users may reuse passwords, forget them, or write them down somewhere unsafe.&nbsp;<\/p>\n\n\n\n<p>Photo #5:<\/p>\n\n\n\n<p>Meme: &#8220;The whole team celebrating after finishing cybersecurity training&#8230; but still clicking the first email that says &#8216;Free Gift Card!'&#8221;<\/p>\n\n\n\n<p>Explanation:<\/p>\n\n\n\n<p>This meme highlights how even when people receive CYSE training, human mistakes still happen. Human centered cybersecurity focuses on understanding why people fall for things like phishing emails and designing systems that help prevent those errors instead of assuming people will always act perfectly.&nbsp;<\/p>\n\n\n\n<p>Photo #17:<\/p>\n\n\n\n<p>Meme: &#8220;Me using the free coffee shop Wi-Fi thinking&#8230; &#8216;What could possibly go wrong??'&#8221;<\/p>\n\n\n\n<p>Explanation:<\/p>\n\n\n\n<p>This connects to human centered cybersecurity beaus people often choose convenience over security. Public Wi-Fi is easy to use, but it can expose personal data to attackers on the same network. Human centered cybersecurity studies these everyday choices and tries to design protections that keep people safe even when they prioritize convenience.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Photo #8: Meme: &#8220;When the system says &#8216;create a strong password with 12 characters, symbols, and numbers&#8217; and now you have to remember it without writing it down.&#8221; Explanation: This relates to human centered cyber security because security systems are often designed to be very strict, but they don&#8217;t always consider how people actually behave. [&hellip;]<\/p>\n","protected":false},"author":32118,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/237"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/users\/32118"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/237\/revisions"}],"predecessor-version":[{"id":238,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/237\/revisions\/238"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/media?parent=237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/categories?post=237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/tags?post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}