{"id":307,"date":"2024-03-04T00:41:43","date_gmt":"2024-03-04T00:41:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/?p=307"},"modified":"2024-03-04T00:41:43","modified_gmt":"2024-03-04T00:41:43","slug":"how-media-tends-to-present-hackers","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/2024\/03\/04\/how-media-tends-to-present-hackers\/","title":{"rendered":"How media tends to present hackers"},"content":{"rendered":"\n<p>In movies\/tv shows hackers tend to be portrayed poorly, not always but most of the time. In movies\/tv shows they generally take very minimal amounts of time to breach firewalls and in general hack into devices\/software, on top of that we see hackers in films plug in a device like a laptop directly into some form \u201cmain frame\u201d via a LAN line which really isn\u2019t necessary for what they are attempting to do. Hacking in tv shows and movies are almost always portrayed as breaching firewalls, or uploading some virus, but one form that is rarely shown is something as simple as trying to breach a human firewall, for instance finding a password on a post it note at someone\u2019s desk at work and using that password to log into their account is a form of hacking as it was unintended by the account owner.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In movies\/tv shows hackers tend to be portrayed poorly, not always but most of the time. In movies\/tv shows they generally take very minimal amounts of time to breach firewalls and in general hack into devices\/software, on top of that we see hackers in films plug in a device like a laptop directly into some&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/2024\/03\/04\/how-media-tends-to-present-hackers\/\">Read More<\/a><\/div>\n","protected":false},"author":28422,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/users\/28422"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/307\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/posts\/307\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/media?parent=307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/categories?post=307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rices-work-cyse201s\/wp-json\/wp\/v2\/tags?post=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}