{"id":334,"date":"2024-08-05T01:53:21","date_gmt":"2024-08-05T01:53:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/esty05\/?p=334"},"modified":"2024-08-05T01:53:21","modified_gmt":"2024-08-05T01:53:21","slug":"journal-entry-8-social-media-influences-on-understanding-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/esty05\/2024\/08\/05\/journal-entry-8-social-media-influences-on-understanding-cybersecurity\/","title":{"rendered":"Journal Entry 8: Social Media Influences on Understanding Cybersecurity"},"content":{"rendered":"The media, particularly television, plays a significant role in shaping people\u2019s<br \/>understanding and perception of cybersecurity and hacking. In the past, movie scenes shared<br \/>unrealistic cybersecurity practices, what most analyzers consider programming jargon. For<br \/>instance, \u201cTron Legacy\u201d perfectly portrays what most films considered hacking in the 1980s. In<br \/>one of the scenes, the characters depict hacking as accessing a machine and installing malicious<br \/>software. However, even though installing software like SO12 could have added a few bugs into<br \/>the system, such an action is not hacking because the character was breaking into a house and<br \/>accessing a computer that was not password protected, encrypted, and required any other<br \/>authorization (Wired, 2019). A similar hacking technique was demonstrated in the movie \u201cThe X<br \/>Files\u201d, where a hacker accesses government files on a computer that does not request a password<br \/>to log in (Wired, 2021a). Thus, in the past, the media shared unrealistic hacking skills that were<br \/>intriguing for the viewers but could not happen in real life.<br \/>In the current media, the understanding of cybersecurity and hacking has changed as<br \/>people can differentiate between realistic and unrealistic representations of hacking and what<br \/>makes it possible. For instance, the movie Silicon Valley S4E9 portrays a realistic scene were<br \/>hackers log in to people\u2019s accounts using a Wi-Fi Pineapple device made by Hak5. If a hacker<br \/>carries the devices even in their backpack, they can hack any phone or computer around their<br \/>vicinity by tricking them into logging into the device instead of the intended legitimate access<br \/>point without telling the difference (Insider, 2021). Therefore, the representation of hacking and<br \/>cybersecurity practices in the current media has advanced because instead of sharing unrealistic<br \/>programming terminologies, it shows accurate hacking techniques that hackers could use to<br \/>access unauthorized or encrypted systems or devices.<br \/><br \/>References<br \/>Insider. (2021). Hacker Rates 12 Hacking Scenes in Movies and TV | How Real Is It? [Video].<br \/>YouTube. https:\/\/www.youtube.com\/watch?v=6BqpU4V0Ypk<br \/>Wired. (2019). Hacker breaks down 26 hacking scenes from movies &amp; TV [Video].<br \/>YouTube. https:\/\/www.youtube.com\/watch?v=SZQz9tkEHIg<br \/>Wired. (2021a). Hacker breaks down hacking scenes from movies &amp; TV [Video].","protected":false},"excerpt":{"rendered":"<p>The media, particularly television, plays a significant role in shaping people\u2019sunderstanding and perception of cybersecurity and hacking. In the past, movie scenes sharedunrealistic cybersecurity practices, what most analyzers consider programming jargon. Forinstance, \u201cTron Legacy\u201d perfectly portrays what most films considered hacking in the 1980s. Inone of the scenes, the characters depict hacking as accessing a [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/334\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}