{"id":335,"date":"2024-10-23T22:23:19","date_gmt":"2024-10-23T22:23:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/averymclean\/?p=335"},"modified":"2024-10-23T22:23:19","modified_gmt":"2024-10-23T22:23:19","slug":"journal-entry-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/averymclean\/2024\/10\/23\/journal-entry-8\/","title":{"rendered":"Journal Entry 8"},"content":{"rendered":"\n<p>Hacking is frequently exaggerated in films and television programs, which portray it as a simple, thrilling process in which hackers can easily breach networks. The public&#8217;s perception of cybersecurity is distorted by this representation. Unlike the glamorous, quick success shown on TV, hacking is actually far more complicated and requires specialized equipment, patience, and in-depth expertise. These exaggerated portrayals may lead to misconceptions regarding the difficulties faced by cybersecurity experts. People either overestimate the skills of hackers or underestimate the hazards of cyberattacks as a result of the media&#8217;s oversimplification, which fuels anxiety or misplaced confidence about digital security concerns. Society&#8217;s perception of hackers and system security professionals is impacted by this misconception.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking is frequently exaggerated in films and television programs, which portray it as a simple, thrilling process in which hackers can easily breach networks. The public&#8217;s perception of cybersecurity is distorted by this representation. Unlike the glamorous, quick success shown on TV, hacking is actually far more complicated and requires specialized equipment, patience, and in-depth&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/averymclean\/2024\/10\/23\/journal-entry-8\/\">Read More<\/a><\/div>\n","protected":false},"author":29502,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts\/335"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/users\/29502"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/comments?post=335"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts\/335\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/posts\/335\/revisions\/336"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/media?parent=335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/categories?post=335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/averymclean\/wp-json\/wp\/v2\/tags?post=335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}