{"id":244,"date":"2023-10-17T23:36:15","date_gmt":"2023-10-17T23:36:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber300\/?p=244"},"modified":"2023-10-17T23:36:15","modified_gmt":"2023-10-17T23:36:15","slug":"journal-entry-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber300\/2023\/10\/17\/journal-entry-8\/","title":{"rendered":"Journal entry #8"},"content":{"rendered":"\n<p>After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity.<\/p>\n\n\n\n<p>Before joining the cyber field the media&#8217;s influence on understanding cybersecurity is very unrealistic and most times it goes unnoticed. The media&#8217;s main objective is to entertain the people so they cannot go through and make everything realistic. However, there is still a message that people can get from them like do not recycle passwords and don&#8217;t log on to just any internet connection because it can be fake. Media makes cybersecurity look futuristic so that people can stay engaged in the film  For example, movies like &#8220;Fast and Furious&#8221; give an unrealistic idea of what hacking looks like although they use realistic terms. I believe since media has a major influence on people if they showed what real cybersecurity work looked like maybe more people would show interest in the field. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity. Before joining the cyber field the media&#8217;s influence on understanding cybersecurity is very unrealistic and most times it goes unnoticed. The media&#8217;s main objective is to entertain the people so they cannot go through and make &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyber300\/2023\/10\/17\/journal-entry-8\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Journal entry #8<\/span><\/a><\/p>\n","protected":false},"author":21638,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts\/244"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/users\/21638"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts\/244\/revisions"}],"predecessor-version":[{"id":245,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts\/244\/revisions\/245"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/media?parent=244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/categories?post=244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/tags?post=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}