{"id":343,"date":"2024-10-16T01:53:30","date_gmt":"2024-10-16T01:53:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ksers001\/?page_id=343"},"modified":"2024-10-16T01:53:32","modified_gmt":"2024-10-16T01:53:32","slug":"journal-7-human-centered-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ksers001\/sample-page\/cyse-201s\/journal-7-human-centered-cybersecurity\/","title":{"rendered":"Journal 7- Human-centered cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink-1024x576.png\" alt=\"\" class=\"wp-image-344\" srcset=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink-300x169.png 300w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink-768x432.png 768w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink-239x133.png 239w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>As more employers adopt remote work policies. Its important to address training on connecting devices to public networks. Places like coffee shops and airports can be a great way for a hacker to access your device.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1-1024x576.png\" alt=\"\" class=\"wp-image-345\" srcset=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1-239x133.png 239w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Another topic that should be addressed when considering the human factor. Phishing can include a promise of some type of reward. However, things like this meme states can often be a way of harvesting credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2-1024x576.png\" alt=\"\" class=\"wp-image-346\" srcset=\"https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2-300x169.png 300w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2-768x432.png 768w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2-239x133.png 239w, https:\/\/sites.wp.odu.edu\/ksers001\/wp-content\/uploads\/sites\/30117\/2024\/10\/Bold-Ink2.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><p class=\"MsoNormal\">Employees can benefit from understanding real threats they may not think of. <span>\u00a0<\/span>Awareness programs should cover ways hackers can get valuable information without accessing a device. People may not stop to think of shoulder surfers and eaves droppers. <\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more employers adopt remote work policies. Its important to address training on connecting devices to public networks. Places like coffee shops and airports can be a great way for a hacker to access your device. Another topic that should be addressed when considering the human factor. Phishing can include a promise of some type&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ksers001\/sample-page\/cyse-201s\/journal-7-human-centered-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":24633,"featured_media":0,"parent":260,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/343"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/users\/24633"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/343\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/343\/revisions\/347"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/260"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/media?parent=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}