{"id":248,"date":"2024-02-26T00:31:16","date_gmt":"2024-02-26T00:31:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/?p=248"},"modified":"2024-02-26T00:31:28","modified_gmt":"2024-02-26T00:31:28","slug":"cyse201s-spring-24-week-7-journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/2024\/02\/26\/cyse201s-spring-24-week-7-journal-entry-7\/","title":{"rendered":"CYSE201S Spring 24: Week 7 \u2013 Journal Entry 7"},"content":{"rendered":"\n<p>Instruction: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual or individual&#8217;s mind(s).<\/p>\n\n\n\n<p>Response: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-1024x768.jpg\" alt=\"\" class=\"wp-image-249\" style=\"width:300px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-1536x1152.jpg 1536w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-2048x1536.jpg 2048w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-600x450.jpg 600w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-min-945x709.jpg 945w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Image one (shown above) is based on a human-centered cybersecurity framework lens as the individual is debating on if a link is legitimate. We know that humans are the weakest link of any network falling to malicious links that seem to be real typically embedded in phishing emails which cyber victims are also vulnerable to as explained by human factors, thus, it is important human factor experts and cybersecurity professionals collaborate. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-1024x683.jpg\" alt=\"\" class=\"wp-image-250\" style=\"width:298px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-2048x1365.jpg 2048w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-600x400.jpg 600w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-1-min-945x630.jpg 945w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Image two (shown above) is based on a human-centered cybersecurity framework lens as the individual has received malware on their computer which could be from many sources. In this scenario, the user received malware from a peer which is common in peer networks when one person gets infected it is likely that someone they know will also have their systems compromised. Human factors helps us understand how this works in a peer environment as more people are interacting in cyberspace vs face-to-face in person. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-1024x683.jpg\" alt=\"\" class=\"wp-image-251\" style=\"width:298px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-2048x1365.jpg 2048w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-600x400.jpg 600w, https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-content\/uploads\/sites\/35530\/2024\/02\/phonto-2-min-945x630.jpg 945w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Image three (shown above) is based on a human-center cybersecurity framework lens as the pup is contemplating on if they should make a rude remark online in order to embarrass another pup. As discussed in this module, it is more likely that a peer will act out in ways that they see other peers do and this is no different in cyberspace. This pup is considering on if they should participate in a form of cyberbullying or not, cyberbullying is a common problem online that can be understood through human factors. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instruction: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual or individual&#8217;s mind(s). Response: Image one (shown above) is based on a human-centered cybersecurity&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/2024\/02\/26\/cyse201s-spring-24-week-7-journal-entry-7\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28476,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts\/248"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/users\/28476"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"predecessor-version":[{"id":252,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts\/248\/revisions\/252"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}