{"id":328,"date":"2023-10-20T15:44:47","date_gmt":"2023-10-20T15:44:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/celli022\/?p=328"},"modified":"2023-10-20T15:44:47","modified_gmt":"2023-10-20T15:44:47","slug":"after-watching-the-video-write-a-journal-entry-about-how-you-think-the-media-influences-our-understanding-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/celli022\/2023\/10\/20\/after-watching-the-video-write-a-journal-entry-about-how-you-think-the-media-influences-our-understanding-about-cybersecurity\/","title":{"rendered":"After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.\u00a0"},"content":{"rendered":"\n<p>Hollywood has incredibly over dramatized what hacking looks like. While they have gotten slightly more accurate, they still take a lot of liberties. They tend to fall back into the easy stereotypes of the lone wolf quickly exploiting a system in super dramatic fashions. This is rarely how it works. It is much slower and less dramatic than that. Hackers also rarely work alone. Hacking is typically a lengthy process of finding vulnerabilities in the targeted systems and building a method to exploit them. Hackers in movies and TV shows often seem to have computing power and superhuman brain power and abilities on a computer. This is also unrealistic. While the best funded hackers might be backed with some server farms and have a a decent number of resources available, the guy spoofing Wi-Fi in a Starbucks and getting your information does not have that available. While these scenes and stereotypes are often incredibly unrealistic, they can still serve a purpose. Movies and TV shows about hacking can boost public awareness of the threats around them.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hollywood has incredibly over dramatized what hacking looks like. While they have gotten slightly more accurate, they still take a lot of liberties. They tend to fall back into the easy stereotypes of the lone wolf quickly exploiting a system in super dramatic fashions. This is rarely how it works. It is much slower and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/celli022\/2023\/10\/20\/after-watching-the-video-write-a-journal-entry-about-how-you-think-the-media-influences-our-understanding-about-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":27242,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/users\/27242"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/328\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}