{"id":358,"date":"2023-12-16T03:06:45","date_gmt":"2023-12-16T03:06:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justin-almond1\/?p=358"},"modified":"2023-12-16T03:06:45","modified_gmt":"2023-12-16T03:06:45","slug":"discussion-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/justin-almond1\/2023\/12\/16\/discussion-6\/","title":{"rendered":"Discussion 6"},"content":{"rendered":"\n<p>Cyber Threats<br>Watch\u00a0this video https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8<br>and pay attention to what the biggest risk of cyber threats are. After<br>watching the video, post an entry in the discussion board describing<br>what you think about the \u201chuman firewall\u201d.<\/p>\n\n\n\n<p>The human firewall can be defined as people in an company whose role is to protect information from cyberattacks. During the Ted Talk,\u00a0 the speaker points out that he views companies and their security as a pipe with a lot of junctions and joints. The &#8220;pipe&#8221; represents information, and people need to feel like its an extreme emergency to know how to protect information. It is important that people make it a habit to protect their information because there are numerous ways to get your information for example if a cybercriminal just gets your name they have the ability to do who knows what with that and can cause a lot of damage to you\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber ThreatsWatch\u00a0this video https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8and pay attention to what the biggest risk of cyber threats are. Afterwatching the video, post an entry in the discussion board describingwhat you think about the \u201chuman firewall\u201d. The human firewall can be defined as people in an company whose role is to protect information from cyberattacks. During the Ted Talk,\u00a0&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justin-almond1\/2023\/12\/16\/discussion-6\/\">Read More<\/a><\/div>\n","protected":false},"author":22050,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/posts\/358"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/users\/22050"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/posts\/358\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/posts\/358\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/media?parent=358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/categories?post=358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-almond1\/wp-json\/wp\/v2\/tags?post=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}