{"id":394,"date":"2024-10-11T18:10:05","date_gmt":"2024-10-11T18:10:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/?p=394"},"modified":"2024-11-09T16:59:27","modified_gmt":"2024-11-09T16:59:27","slug":"week-7-journal","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/10\/11\/week-7-journal\/","title":{"rendered":"Journal 7"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"580\" src=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/Untitled_Export_V1-1.jpeg\" alt=\"\" class=\"wp-image-396\" srcset=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/Untitled_Export_V1-1.jpeg 870w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/Untitled_Export_V1-1-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/Untitled_Export_V1-1-768x512.jpeg 768w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/Untitled_Export_V1-1-450x300.jpeg 450w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/><\/figure>\n\n\n\n<p>Explanation: The image shows the weakest link of cybersecurity. Many would assume that the the device would be the weakest link, but it reality many breaches and cyberattacks are caused by human error. Human centric cybersecurity recognizes the human element of the situation.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"854\" src=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1.jpeg\" alt=\"photo-1589652717521-10c0d092dea9 V2\" class=\"wp-image-398\" srcset=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1.jpeg 1280w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1-1024x683.jpeg 1024w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1-768x512.jpeg 768w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1-960x640.jpeg 960w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-1-450x300.jpeg 450w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Explanation: Even though recognizing a phishing email might be obvious to some it is important to realize others might not have a familiarity on the subject, which is why cybersecurity training is so important. This realization is a key foundational idea of human focused cybersecurity. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"1280\" src=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image.jpeg\" alt=\"ghen-mar-cuano-R6dSBkz32B8-unsplash V1\" class=\"wp-image-397\" srcset=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image.jpeg 960w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-225x300.jpeg 225w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-768x1024.jpeg 768w, https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-content\/uploads\/sites\/35060\/2024\/10\/image-630x840.jpeg 630w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Explanation: Ongoing and updated training for people to recognize the risks and signs of potential cybersecurity threats is a key part of Human-centered cybersecurity. For example, a company may host a training meeting on common scam and later send out a test email with red flag to see if the employees actually can actually recognize the warning signs. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explanation: The image shows the weakest link of cybersecurity. Many would assume that the the device would be the weakest link, but it reality many breaches and cyberattacks are caused by human error. Human centric cybersecurity recognizes the human element of the situation. Explanation: Even though recognizing a phishing email might be obvious to some&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/10\/11\/week-7-journal\/\">Read More<\/a><\/div>\n","protected":false},"author":28201,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":4},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/posts\/394"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/users\/28201"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":420,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/posts\/394\/revisions\/420"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/tags?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}