{"id":359,"date":"2023-07-18T14:26:55","date_gmt":"2023-07-18T14:26:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=359"},"modified":"2023-07-18T14:26:55","modified_gmt":"2023-07-18T14:26:55","slug":"journal-entry-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-8\/","title":{"rendered":"Journal Entry 8"},"content":{"rendered":"\n<p>After watching the video, write a journal entry about how you think<br>the media influences our understanding about cybersecurity<\/p>\n\n\n\n<p>How I think the media influences our understanding about cybersecurity is that they make it seem like it\u2019s easily understood. In reality there needs to be a certain level of understanding to even know what is even occurring in that situation. Another is that they portray these situations as very quick. These situations take a lot more time and are more complex than they show. Another is that these cyber offenders use methods that don\u2019t really work or are only partially right.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After watching the video, write a journal entry about how you thinkthe media influences our understanding about cybersecurity How I think the media influences our understanding about cybersecurity is that they make it seem like it\u2019s easily understood. In reality there needs to be a certain level of understanding to even know what is even&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-8\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/359"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/359\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/359\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}