{"id":419,"date":"2025-04-21T00:15:28","date_gmt":"2025-04-21T00:15:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jjohn287\/?p=419"},"modified":"2025-04-21T00:15:28","modified_gmt":"2025-04-21T00:15:28","slug":"journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jjohn287\/2025\/04\/21\/journal-entry-7\/","title":{"rendered":"Journal Entry 7"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"268\" height=\"188\" src=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/04\/image.png\" alt=\"\" class=\"wp-image-424\" style=\"width:278px;height:auto\" \/><\/figure>\n\n\n\n<p>When the system says your password is too weak, but you\u2019ve already used all the ones you can remember.\u201d This shows the struggle of password fatigue, where users create weak or repeated passwords because remembering complex ones is too difficult.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"168\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/04\/image-1.png\" alt=\"\" class=\"wp-image-427\" \/><\/figure>\n\n\n\n<p>A human-centered approach would promote password managers or alternative authentication methods to ease the burden. <em>\u201cThis email says I won a free iPhone\u2026 maybe just one click?\u201d<\/em><br>This represents phishing attacks, where social engineering tricks people into clicking malicious links. A human-centered approach would focus on better phishing awareness training, user-friendly email security tools, and clear warning signals.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"608\" height=\"586\" src=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/04\/image-2.png\" alt=\"\" class=\"wp-image-428\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/04\/image-2.png 608w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/04\/image-2-300x289.png 300w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/04\/image-2-311x300.png 311w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/figure>\n\n\n\n<p>\u201cHackers and burglars: \u2018Noted <\/p>\n\n\n\n<p>Cybersecurity Connection: This meme highlights the risk of oversharing personal information online, which can lead to cyberstalking, identity theft, or real-world crimes. A human-centered approach would include privacy education, social media settings that guide users to safer sharing habits, and clearer alerts about the risks of public posts.This meme highlights the risk of oversharing personal information online, which can lead to cyberstalking, identity theft, or real-world crimes. A human-centered approach would include privacy education, social media settings that guide users to safer sharing habits, and clearer alerts about the risks of public posts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When the system says your password is too weak, but you\u2019ve already used all the ones you can remember.\u201d This shows the struggle of password fatigue, where users create weak or repeated passwords because remembering complex ones is too difficult.\u00a0 A human-centered approach would promote password managers or alternative authentication methods to ease the burden&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jjohn287\/2025\/04\/21\/journal-entry-7\/\">Read More<\/a><\/div>\n","protected":false},"author":29235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/posts\/419"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/users\/29235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"predecessor-version":[{"id":429,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/posts\/419\/revisions\/429"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}