{"id":202,"date":"2023-10-17T11:47:55","date_gmt":"2023-10-17T11:47:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/?p=202"},"modified":"2023-10-17T11:47:58","modified_gmt":"2023-10-17T11:47:58","slug":"journal-entry-seven-human-centered-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/2023\/10\/17\/journal-entry-seven-human-centered-cybersecurity\/","title":{"rendered":"Journal Entry Seven: Human-Centered  Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"203\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading-1024x576.png\" alt=\"\" class=\"wp-image-203\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading-300x169.png 300w, https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading-768x432.png 768w, https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-content\/uploads\/sites\/34294\/2023\/10\/Add-a-heading.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p>The meme above was created to show what I&#8217;ve seen in the workplace at facilities that DO NOT utilize the human-centered cybersecurity model. I don&#8217;t think enough emphasis was placed on cybersecurity and it became just another training to be completed. If the human-centered cybersecurity model was implemented, the photo above would show a well informed, properly trained technician\/engineer completing their daily tasks. Good cybersecurity practices would be second nature to them because their training and education was a priority. This model focuses on the people which makes sense as people are the most common vulnerability in Cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">The meme above was created to show what I&#8217;ve seen in the workplace at facilities that DO NOT utilize the human-centered cybersecurity model. I don&#8217;t think enough emphasis was placed on cybersecurity and it became just another training to be completed. If the human-centered cybersecurity model was implemented, the photo above would show a well informed, properly trained technician\/engineer completing&hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/2023\/10\/17\/journal-entry-seven-human-centered-cybersecurity\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":26115,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/202"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/users\/26115"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/202\/revisions"}],"predecessor-version":[{"id":204,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/202\/revisions\/204"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}