{"id":253,"date":"2024-02-20T02:37:45","date_gmt":"2024-02-20T02:37:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?p=253"},"modified":"2025-11-12T20:53:43","modified_gmt":"2025-11-12T20:53:43","slug":"journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/20\/journal-entry-7\/","title":{"rendered":"Journal Entry #7"},"content":{"rendered":"\n<p>Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<p><a href=\"https:\/\/unsplash.com\/photos\/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs\">https:\/\/unsplash.com\/photos\/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1024x683.png\" alt=\"\" class=\"wp-image-254\" style=\"width:471px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1024x683.png 1024w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-300x200.png 300w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-768x512.png 768w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-600x400.png 600w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-945x630.png 945w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image.png 1470w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>&#8220;You can&#8217;t teach an old dog new tricks, right?&#8221;<\/p>\n\n\n\n<p>This relates to the human-centered cybersecurity framework because no matter the age, we can all make sure we continue to stay educated and up to date on the latest scamming methods to protect our private information. <\/p>\n\n\n\n<p><a href=\"https:\/\/unsplash.com\/photos\/woman-in-white-button-up-shirt-holding-silver-iphone-6-R6dSBkz32B8\">https:\/\/unsplash.com\/photos\/woman-in-white-button-up-shirt-holding-silver-iphone-6-R6dSBkz32B8<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/Screen-Shot-2024-02-19-at-9.26.41-PM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"432\" height=\"574\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/Screen-Shot-2024-02-19-at-9.26.41-PM.png\" alt=\"\" class=\"wp-image-255\" style=\"width:281px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/Screen-Shot-2024-02-19-at-9.26.41-PM.png 432w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/Screen-Shot-2024-02-19-at-9.26.41-PM-226x300.png 226w\" sizes=\"(max-width: 432px) 100vw, 432px\" \/><\/a><\/figure>\n\n\n\n<p>&#8220;Not today hacker!&#8221;<\/p>\n\n\n\n<p>In this meme, the girl prevented a phishing attack by being vigilant and not clicking a link to a malicious site.<\/p>\n\n\n\n<p><a href=\"https:\/\/unsplash.com\/photos\/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8\">https:\/\/unsplash.com\/photos\/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1-1024x683.png\" alt=\"\" class=\"wp-image-256\" style=\"width:555px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1-1024x683.png 1024w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1-300x200.png 300w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1-768x512.png 768w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1-600x400.png 600w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1-945x630.png 945w, https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2024\/02\/image-1.png 1470w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>&#8220;Wow the coffee here is great!&#8221; &#8211; Says the guy who now unknowingly has 4 unauthorized charges and is $20,000 in debt.<\/p>\n\n\n\n<p>In this meme, the man is connected to what is posed as the coffee shop&#8217;s public wifi, but he is actually connected to an unsafe network that has now stolen his personal information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). https:\/\/unsplash.com\/photos\/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs &#8220;You can&#8217;t teach an old dog new tricks, right?&#8221; This relates&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/20\/journal-entry-7\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25880,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/253"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/253\/revisions\/257"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}