{"id":416,"date":"2024-02-19T01:21:25","date_gmt":"2024-02-19T01:21:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dharg002\/?p=416"},"modified":"2024-03-10T23:38:00","modified_gmt":"2024-03-10T23:38:00","slug":"week-6-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dharg002\/2024\/02\/19\/week-6-journal-entry\/","title":{"rendered":"Week 6 Journal"},"content":{"rendered":"\n<p> Spotting Fake Websites<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Oftentimes when navigating the internet, we are left with only our best judgment to mitigate malicious users from harming our systems and accessing our data unauthorized. One way that malicious users gain access to our systems is through the websites we connect to over the internet.<\/p>\n\n\n\n<p>What are some telltale signs that a website is fake or suspicious?<\/p>\n\n\n\n<p>1: An Invalid SSL Certificate or Insecure Error <\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/badssl.png\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"322\" src=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/badssl.png\" alt=\"\" class=\"wp-image-417\" style=\"width:332px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/badssl.png 633w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/badssl-300x153.png 300w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><\/a><\/figure>\n\n\n\n<p>(Fitzgerald, 2024)<\/p>\n\n\n\n<p>Fitzgerald, A. (2024, January 5). <em>A simple explanation of SSL Certificate Errors &amp; How to fix them<\/em>. HubSpot Blog. https:\/\/blog.hubspot.com\/website\/fix-ssl-certificate-error<\/p>\n\n\n\n<p>When accessing a fake website, you can expect to come across an error that warns the users of its invalid SSL Certificate and that the connection to the website is not encrypted; leaving the connected computer vulnerable to a middleman hacker. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"891\" height=\"258\" src=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/image.png\" alt=\"\" class=\"wp-image-418\" style=\"width:502px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/image.png 891w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/image-300x87.png 300w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/image-768x222.png 768w\" sizes=\"(max-width: 891px) 100vw, 891px\" \/><\/a><\/figure>\n\n\n\n<p>A trustworthy site (in our example the Old Dominion student portal) displays a secure connection and a valid certificate of authenticity. <\/p>\n\n\n\n<p>2: A Lack of Contact Information<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-info.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"490\" src=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-info-1024x490.png\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-info-1024x490.png 1024w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-info-300x144.png 300w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-info-768x368.png 768w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-info.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>When visiting online shops, it is a good decision to check if the site owner has left any contact information or an About page. The website I have in this example was actually removed and only snapshots are available through the online WaybackMachine. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"773\" src=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-1024x773.png\" alt=\"\" class=\"wp-image-420\" style=\"width:438px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-1024x773.png 1024w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-300x227.png 300w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact-768x580.png 768w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/contact.png 1242w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Amazon being a well-known and trusted site has many links to get in contact with various teams throughout the business. <\/p>\n\n\n\n<p>3: Often Originate from Spam Emails or Strange URLs<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/spam.png\"><img loading=\"lazy\" decoding=\"async\" width=\"714\" height=\"309\" src=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/spam.png\" alt=\"\" class=\"wp-image-421\" style=\"width:527px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/spam.png 714w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/spam-300x130.png 300w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/><\/a><\/figure>\n\n\n\n<p>(Woods, unsecure)<\/p>\n\n\n\n<p>Another way a malicious user can get you to access a fake website is through phishing emails and asking for account and billing information. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/cxhecker.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"770\" src=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/cxhecker-1024x770.png\" alt=\"\" class=\"wp-image-422\" style=\"width:543px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/cxhecker-1024x770.png 1024w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/cxhecker-300x226.png 300w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/cxhecker-768x577.png 768w, https:\/\/sites.wp.odu.edu\/dharg002\/wp-content\/uploads\/sites\/33974\/2024\/02\/cxhecker.png 1490w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><em>Phishing link and URL checker<\/em>. EasyDMARC. (n.d.). https:\/\/easydmarc.com\/tools\/phishing-url<\/p>\n\n\n\n<p>When in doubt, search the internet for any suspicious connections to the URL. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spotting Fake Websites Oftentimes when navigating the internet, we are left with only our best judgment to mitigate malicious users from harming our systems and accessing our data unauthorized. One way that malicious users gain access to our systems is through the websites we connect to over the internet. What are some telltale signs that &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/dharg002\/2024\/02\/19\/week-6-journal-entry\/\">Continue reading<\/a><\/p>\n","protected":false},"author":27367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/posts\/416"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/users\/27367"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/comments?post=416"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/posts\/416\/revisions"}],"predecessor-version":[{"id":452,"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/posts\/416\/revisions\/452"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/media?parent=416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/categories?post=416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dharg002\/wp-json\/wp\/v2\/tags?post=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}