{"id":213,"date":"2025-03-26T13:04:23","date_gmt":"2025-03-26T13:04:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdent006\/?p=213"},"modified":"2025-03-26T13:04:23","modified_gmt":"2025-03-26T13:04:23","slug":"journal-entry-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kdent006\/2025\/03\/26\/journal-entry-8\/","title":{"rendered":"Journal Entry 8"},"content":{"rendered":"\n<p>The way the media influences our understanding of cybersecurity in that it portrays it as just<br>hacking. In that most media that does include anything cyber related it is mostly just about<br>hacking, and a dramatization of the process of hacking. Most movies and shows that include a<br>hacker shows a person going through the process of hacking in a few hours or in a night, and<br>while some instances of hacking may take that amount of time what\u2019s often being depicted in<br>these forms of media is a complex hack that would take a experienced hacker a few days or even<br>months to set up and execute. Since that\u2019s all that\u2019s normally shown most people might believe<br>that all cybersecurity entails is just hacking, when it\u2019s a varied field that has multiple paths for<br>one to take. While there are depictions of cyber security that do show more to it, especially today<br>with most media that does show hacking that it\u2019s not just the computer one might get hacked on,<br>everything in their house is a tool a hacker can use to their advantage. To conclude, the way the<br>media presents cybersecurity is a double edged sword, in that while most media does just focus<br>on one aspect of the whole cybersecurity field it\u2019s arguably one of the most important to show<br>since it can show what can be exploited to the mass and help prevent incidents were hacking<br>might take place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The way the media influences our understanding of cybersecurity in that it portrays it as justhacking. In that most media that does include anything cyber related it is mostly just abouthacking, and a dramatization of the process of hacking. Most movies and shows that include ahacker shows a person going through the process of hacking&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdent006\/2025\/03\/26\/journal-entry-8\/\">Read More<\/a><\/div>\n","protected":false},"author":30384,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/213"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/users\/30384"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/213\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}