Module 8 Journal

The thing that we see in the media , is that a lot of “computer experts” just click the computer
and they get into the network and will not be detected. The videos that were shown a lot of the
tools that were used a lot of hackers would not be able to afford them or it would not be that easy
to get into it. One of the videos , the hacker in the video sends a phishing email and then when it
clicks not the attachment but the email it somehow connects to the software and it tracks the
victims movements and it opens his camera as well. While not impossible it will be hard to
translate into real life. With this type of information being prepared in the media makes people
believe that it is hard to get into the network and when they do they can stay inside the network
for a certain amount of time before being detected. The only thing changing is that a lot of
people do not realize that this could happen to them. Many movie go-ers zone out when there is
a technical person talking in the movie only because they use a lot of jargon that they would not
be able to understand. The older media did a lot of physical intrusion when it comes to
cybersecurity , it used to be to get into a safe they needed to hear for the click, now they need to
get to the server room to unlock from the twice locked safe.

Leave a Reply

Your email address will not be published. Required fields are marked *