{"id":325,"date":"2025-08-07T09:00:34","date_gmt":"2025-08-07T09:00:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=325"},"modified":"2025-08-07T09:18:52","modified_gmt":"2025-08-07T09:18:52","slug":"cyse-201s-week-eight-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/cyse-201s-week-eight-journal-entry\/","title":{"rendered":"CYSE 201S Week Eight Journal Entry                     How media influences our understanding about cybersecurity"},"content":{"rendered":"\n<p> By looking at the videos, well Hollywood is Hollywood, it has made it very entertaining in<\/p>\n\n\n\n<p>depicting cyberattacks and hackers. I have always been fascinated by how smart and<\/p>\n\n\n\n<p>cool hacking is displayed, so cool, easy and practical. They make it seem so classy,<\/p>\n\n\n\n<p>uncomplicated, and fast, so fast with so many pop-ups, and with many imaginary tech<\/p>\n\n\n\n<p>and gadgets not invented yet. Some parts can be true, and can be also scary, stealing<\/p>\n\n\n\n<p>people&#8217;s identities, phishing attacks which happen so often. Some hackers are smart<\/p>\n\n\n\n<p>and super skilled at what they do, and can write data code fast, but not as fast as they<\/p>\n\n\n\n<p>are reading it and solving it in movies.<\/p>\n\n\n\n<p>Realistically, cybersecurity is not that exciting like it is depicted to be on the big screen,<\/p>\n\n\n\n<p>it takes time and lots and lots of patience and research on what they actually want to<\/p>\n\n\n\n<p>hack.<\/p>\n\n\n\n<p>One thing the media has done right is that hacking types are becoming more and more<\/p>\n\n\n\n<p>popular, now with actual conventions for people to compete and show their skills, it has<\/p>\n\n\n\n<p>become more acceptable in our society, and people will network within to be able to<\/p>\n\n\n\n<p>excel and learn more skills. Also by advertising it, people can take advantage of the<\/p>\n\n\n\n<p>information to create better safeguards to protect their systems, and be willing to invest<\/p>\n\n\n\n<p>a little more to enhance their security measures, training and policies.<\/p>\n\n\n\n<p>Just like movies predicted some of the technological advantages, my belief is that it will<\/p>\n\n\n\n<p>happen again, and it&#8217;s happening now. With Japan&#8217;s new downloading speeds and AI<\/p>\n\n\n\n<p>new groundbreaking features, advancing and breaking innovations in real time, it is not<\/p>\n\n\n\n<p>so hard to predict that many of the features predicted can actually happen, very soon.<\/p>\n\n\n\n<p>It is hard to predict how far our understanding will change in the future, it is just that<\/p>\n\n\n\n<p>breakthroughs are happening very often, and our new media today, will be old and<\/p>\n\n\n\n<p>obsolete tomorrow, but one thing for sure is, that cybersecurity is reinventing its coarse<\/p>\n\n\n\n<p>as well, like with interdisciplinary studies has help us better understand the coarse.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By looking at the videos, well Hollywood is Hollywood, it has made it very entertaining in depicting cyberattacks and hackers. I have always been fascinated by how smart and cool hacking is displayed, so cool, easy and practical. They make it seem so classy, uncomplicated, and fast, so fast with so many pop-ups, and with&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/cyse-201s-week-eight-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/325"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":348,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/325\/revisions\/348"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}