{"id":440,"date":"2024-11-19T03:36:06","date_gmt":"2024-11-19T03:36:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/clydercabico\/?page_id=440"},"modified":"2024-11-21T03:51:26","modified_gmt":"2024-11-21T03:51:26","slug":"journal-entry-14","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/clydercabico\/journal-entry-14\/","title":{"rendered":"Journal Entry 14"},"content":{"rendered":"\n<p><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy\u00a0Links to an external site<\/a> has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/p>\n\n\n\n<p>I feel that the five most serious violations are: 1. using copyrighted images, 2. sharing passwords, addresses, or photos of others, 3. bullying and trolling, 4. recording a VoIP call without consent, and 5. faking your identity online.<\/p>\n\n\n\n<ol>\n<li>Using copyrighted images is a serious offense, because not only are copyrighted images protected under the copyright clause of the U.S.C., but infringements to intellectual property can reward someone with hefty fines.<\/li>\n\n\n\n<li>For this one, specifically sharing passwords, is highly ostracized by cybersecurity practitioners, scholars, and professionals alike. This undermines integrity, specifically non-repudiation.<\/li>\n\n\n\n<li>Bullying and trolling in the ICT realm is notorious and can cause social and behavioral issues. These issues can cascade to self-inflicted harm, or follow-on physical violence. Additionally, depending on the severity of bullying and trolling, such actions may violate the CFAA, or statutory laws that criminalize these actions.<\/li>\n\n\n\n<li>This is a serious offense because depending on the nature of recording of a VoIP, privacy laws may be violated. Privacy in itself is an implied right. Additionally, again, dependent on the nature, and setting,  Title 1 of the ECPA may be violated, leading to litigation and financial compensation, or even incarceration.<\/li>\n\n\n\n<li>Faking an identity online is a serious offense because it infringes on privacy and undermines confidentiality, a pillar of the CIA triad in cybersecurity.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Andriy\u00a0Links to an external site has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. I feel that the five most serious violations are: 1. using copyrighted images, 2. sharing passwords,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/clydercabico\/journal-entry-14\/\">Read More<\/a><\/div>\n","protected":false},"author":29613,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/pages\/440"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/users\/29613"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/pages\/440\/revisions"}],"predecessor-version":[{"id":539,"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/pages\/440\/revisions\/539"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/clydercabico\/wp-json\/wp\/v2\/media?parent=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}