{"id":210,"date":"2024-02-26T02:36:18","date_gmt":"2024-02-26T02:36:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/?p=210"},"modified":"2024-02-26T02:36:18","modified_gmt":"2024-02-26T02:36:18","slug":"discussion-question-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/02\/26\/discussion-question-7\/","title":{"rendered":"Discussion Question 7"},"content":{"rendered":"\n<p>Prompt: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>For the three following memes the explanation is as follows;<\/p>\n\n\n\n<ul>\n<li> For the first meme the woman is excited! This is because by implementing multi step authentication on both user and server side, she stopped user data from being released to the internet. <\/li>\n<\/ul>\n\n\n\n<ul>\n<li>For the second the dog is concerned because he wants to add authentic boats to the game but another developer is thinking about actually using the leaked documents. <\/li>\n<\/ul>\n\n\n\n<ul>\n<li>For the third it is a base statement on internet needing to moderate how they show themselves on the internet and in person as that information is forever. <br><\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:1065px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"769\" class=\"wp-block-cover__image-background wp-image-214\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-1.png\" style=\"object-position:46% 13%\" data-object-fit=\"cover\" data-object-position=\"46% 13%\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-1.png 577w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-1-225x300.png 225w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-larger-font-size\" style=\"font-style:normal;font-weight:700\">When your framework stopped another Ashley Madison leak<\/p>\n<\/div><\/div>\n\n\n\n<p><br><\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:569px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" class=\"wp-block-cover__image-background wp-image-215\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2-1024x681.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2-1024x681.png 1024w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2-300x200.png 300w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2-768x511.png 768w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2-600x399.png 600w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2-945x629.png 945w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-2.png 1153w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">When your co-worker starts talking about classified leaks implementation when you just want to add cool boat<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:814px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"771\" class=\"wp-block-cover__image-background wp-image-216\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-3.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-3.png 512w, https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-content\/uploads\/sites\/35308\/2024\/02\/image-3-199x300.png 199w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Everyone is worried about the government having your faces<br><br>They forgot they have driver licenses.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Prompt: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). For the three following memes the explanation is as follows;<\/p>\n","protected":false},"author":28356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/210"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/users\/28356"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":217,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/210\/revisions\/217"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}