{"id":332,"date":"2024-10-20T21:12:11","date_gmt":"2024-10-20T21:12:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/averymclean\/?p=332"},"modified":"2024-10-20T21:12:11","modified_gmt":"2024-10-20T21:12:11","slug":"journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/averymclean\/2024\/10\/20\/journal-entry-7\/","title":{"rendered":"Journal Entry 7"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/averymclean\/wp-content\/uploads\/sites\/36895\/2024\/10\/meme-finished-product.jpg\" alt=\"\" class=\"wp-image-333\" srcset=\"https:\/\/sites.wp.odu.edu\/averymclean\/wp-content\/uploads\/sites\/36895\/2024\/10\/meme-finished-product.jpg 1024w, https:\/\/sites.wp.odu.edu\/averymclean\/wp-content\/uploads\/sites\/36895\/2024\/10\/meme-finished-product-300x300.jpg 300w, https:\/\/sites.wp.odu.edu\/averymclean\/wp-content\/uploads\/sites\/36895\/2024\/10\/meme-finished-product-150x150.jpg 150w, https:\/\/sites.wp.odu.edu\/averymclean\/wp-content\/uploads\/sites\/36895\/2024\/10\/meme-finished-product-768x768.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ol>\n<li><strong>Tile 1 &#8211; &#8220;What I think: One strong password will keep me safe&#8221;:<\/strong> I used to believe that if I just had a strong password, I&#8217;d be fully protected from cyber threats. But that&#8217;s only part of the solution there are other ways hackers can target me, even if my password is secure.<\/li>\n\n\n\n<li><strong>Tile 2 &#8211; &#8220;What\u2019s actually happening: I am the human firewall&#8221;:<\/strong> I realize now that I play a critical role in keeping myself and my data safe. I need to stay alert and recognize phishing attempts, suspicious links, or any odd behavior online because I\u2019m the first line of defense in my own cybersecurity.<\/li>\n\n\n\n<li><strong>Tile 3 &#8211; &#8220;What hackers are doing: Phishing, password cracking, and social engineering&#8221;:<\/strong> While I might be confident in my strong password, hackers are busy using other tactics like phishing emails and manipulating human error to bypass security measures. It&#8217;s not just about technology; it&#8217;s about outsmarting them through awareness and caution.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29502,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts\/332"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/users\/29502"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts\/332\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}