{"id":297,"date":"2024-02-26T02:52:35","date_gmt":"2024-02-26T02:52:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/?p=297"},"modified":"2024-02-26T02:52:35","modified_gmt":"2024-02-26T02:52:35","slug":"cyse-journal-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/2024\/02\/26\/cyse-journal-7\/","title":{"rendered":"CYSE Journal 7"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-205631-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"711\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-205631-1-711x1024.png\" alt=\"\" class=\"wp-image-300\" style=\"width:401px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-205631-1-711x1024.png 711w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-205631-1-208x300.png 208w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-205631-1-768x1106.png 768w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-205631-1.png 891w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><\/a><\/figure>\n\n\n\n<p>&nbsp;This happened to my mother and my aunt, because my mother trusted her sister with her phone because her sister is a part of her human firewall, but my aunt discovered my mom\u2019s face ID would let her in, and she used it to order uber eats.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-1024x682.png\" alt=\"\" class=\"wp-image-301\" srcset=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-1024x682.png 1024w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-300x200.png 300w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-768x511.png 768w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-1536x1022.png 1536w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-960x640.png 960w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1-451x300.png 451w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-204044-1.png 1669w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>This is an example of information that is passed nonchalantly which are sometimes used for password protection. Commonly known information about you such as pets names, children\u2019s names, and favorite movies are not secure enough to be used for passwords.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-215155.png\"><img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"511\" src=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-215155.png\" alt=\"\" class=\"wp-image-302\" srcset=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-215155.png 780w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-215155-300x197.png 300w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-215155-768x503.png 768w, https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-content\/uploads\/sites\/35430\/2024\/02\/Screenshot-2024-02-25-215155-458x300.png 458w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/a><\/figure>\n\n\n\n<p>My grandmother shares to much information about herself on social media through posts, which is yet another example of giving to much information to the wrong people.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;This happened to my mother and my aunt, because my mother trusted her sister with her phone because her sister is a part of her human firewall, but my aunt discovered my mom\u2019s face ID would let her in, and she used it to order uber eats. This is an example of information that is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/2024\/02\/26\/cyse-journal-7\/\">Read More<\/a><\/div>\n","protected":false},"author":28422,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/users\/28422"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/297\/revisions\/303"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}