{"id":332,"date":"2024-08-05T01:52:38","date_gmt":"2024-08-05T01:52:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/esty05\/?p=332"},"modified":"2024-08-05T01:52:38","modified_gmt":"2024-08-05T01:52:38","slug":"journal-entry-6-we-have-many-misconceptions-about-cybersecurity-here-hackers-tell-you-about-some-of-our-misconceptions-what-personal-misconceptions-did-you-have-before-you-started-to-study-cybers","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/esty05\/2024\/08\/05\/journal-entry-6-we-have-many-misconceptions-about-cybersecurity-here-hackers-tell-you-about-some-of-our-misconceptions-what-personal-misconceptions-did-you-have-before-you-started-to-study-cybers\/","title":{"rendered":"Journal Entry 6: We have many misconceptions about cybersecurity.  Here, hackers tell you about some of our misconceptions. What personal misconceptions did you have before you started to study cybersecurity? Have those been proven right or wrong?"},"content":{"rendered":"Before studying cybersecurity, I believed that hackers could hack even the most secure<br \/>systems as they devise advanced strategies to gain access. I thought cybersecurity involves<br \/>complex coding and technical prowess, and hackers are highly skilled programmers who work in<br \/>isolation and have sophisticated methods and systems to break into systems even if they are fully<br \/>secure. However, my exposure during the course has proven me wrong because even though<br \/>hackers have advanced programming skills, they are not fully equipped to attack all systems.<br \/>Insider (2021) \u201cHacker Rates 12 Hacking Scenes in Movies and TV\u201d examines TV and movie<br \/>scenes on hacking to enlighten the audience that hackers do not break into people\u2019s private<br \/>accounts; users let them by simply logging in. For instance, some password combinations,<br \/>especially ones with multiple special characters, are impossible for hackers to crack, and it would<br \/>require a significant amount of time and money to decipher such information, which is very<br \/>expensive. Thus, the course has challenged my misconceptions about cybersecurity because I<br \/>have learned that people increase their vulnerabilities to hacking as they lack the awareness to<br \/>protect their online activity. The course has corrected my oversimplified views about<br \/>cybersecurity, I now know hacking happens due to human factors, and mere passwords and<br \/>antivirus software are not enough to keep users safe.<br \/><br \/>References<br \/>Insider. (2021). Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? |<br \/>Insider [Video]. YouTube. https:\/\/www.youtube.com\/watch?v=6BqpU4V0Ypk<br \/><br \/>","protected":false},"excerpt":{"rendered":"<p>Before studying cybersecurity, I believed that hackers could hack even the most securesystems as they devise advanced strategies to gain access. I thought cybersecurity involvescomplex coding and technical prowess, and hackers are highly skilled programmers who work inisolation and have sophisticated methods and systems to break into systems even if they are fullysecure. However, my [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/332"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/332\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}