{"id":327,"date":"2024-08-05T01:24:54","date_gmt":"2024-08-05T01:24:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=327"},"modified":"2024-08-05T01:24:54","modified_gmt":"2024-08-05T01:24:54","slug":"module-6-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-6-journal-entry\/","title":{"rendered":"Module 6 Journal Entry"},"content":{"rendered":"\n<p>The misconception with cyber security is that it is almost non customer facing and one will not<br>need to interact with another human at all. As I\u2019ve gotten farther along in my cybersecurity<br>career, talking to people is actually very pivotal to this field because we are here to teach people<br>about cyber security for preventative maintenance. At the start of my cybersecurity year these are<br>the misconceptions that I had. I thought that it was really easy to hack into someone&#8217;s machine<br>and then remotely control that machine. In the video the analyst is watching clips where the<br>hacker sends a spear phishing email and when the victim clicks on the link the video of him<br>shows up on the hacker&#8217;s computer. I always thought it was that easy but the analyst informs the<br>audience that they have to be more than just clicking on a link. There needs to be an actual<br>website or application that the victims stay on for a long period of time and maybe if they<br>misname a section of the website but is really a screen sharing option that could be an option.<br>The next one that I had is that hackers love to do really hard jobs that take a lot of time. In<br>hindsight it makes sense that they always do it the easy way because most of the time one needs<br>to work fast when hacking someone&#8217;s account or information. It is a work harder and not smarter<br>process and since a lot of hacker\u2019s know that people use the same password for a lot of their<br>accounts once you find one you find all of them which makes the work smarter not harder.<\/p>\n\n\n\n<p>Insider (2021,March 16) Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? |<br>Insider[Video]. Youtube.<br>https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The misconception with cyber security is that it is almost non customer facing and one will notneed to interact with another human at all. As I\u2019ve gotten farther along in my cybersecuritycareer, talking to people is actually very pivotal to this field because we are here to teach peopleabout cyber security for preventative maintenance. At&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-6-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/327\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}