{"id":354,"date":"2023-07-18T14:23:59","date_gmt":"2023-07-18T14:23:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=354"},"modified":"2023-07-18T14:23:59","modified_gmt":"2023-07-18T14:23:59","slug":"journal-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-6\/","title":{"rendered":"Journal Entry 6"},"content":{"rendered":"\n<p>Can you spot three fake websites and compare three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/p>\n\n\n\n<p>Three fake websites are zapatopi.net, househippofoundation.org, and thedogisland.com. Three real websites are amazon.com, bestbuy.com, and nbcnews.com The fake websites have a lot of ads and pop ups on their websites. The fake ads also don\u2019t look professional. The real websites are professional, and they also have points of contact on their websites. What makes the fake websites fake is that they don\u2019t have any authenticity on their websites as well as and real social media presence on any platforms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can you spot three fake websites and compare three fake websites to three real websites, plus showcase what makes the fake websites fake? Three fake websites are zapatopi.net, househippofoundation.org, and thedogisland.com. Three real websites are amazon.com, bestbuy.com, and nbcnews.com The fake websites have a lot of ads and pop ups on their websites. The fake&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-6\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/354"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/354\/revisions"}],"predecessor-version":[{"id":356,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/354\/revisions\/356"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}