{"id":329,"date":"2024-08-05T01:26:34","date_gmt":"2024-08-05T01:26:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=329"},"modified":"2024-08-05T01:26:34","modified_gmt":"2024-08-05T01:26:34","slug":"module-8-journal","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-8-journal\/","title":{"rendered":"Module 8 Journal"},"content":{"rendered":"\n<p>The thing that we see in the media , is that a lot of \u201ccomputer experts\u201d just click the computer<br>and they get into the network and will not be detected. The videos that were shown a lot of the<br>tools that were used a lot of hackers would not be able to afford them or it would not be that easy<br>to get into it. One of the videos , the hacker in the video sends a phishing email and then when it<br>clicks not the attachment but the email it somehow connects to the software and it tracks the<br>victims movements and it opens his camera as well. While not impossible it will be hard to<br>translate into real life. With this type of information being prepared in the media makes people<br>believe that it is hard to get into the network and when they do they can stay inside the network<br>for a certain amount of time before being detected. The only thing changing is that a lot of<br>people do not realize that this could happen to them. Many movie go-ers zone out when there is<br>a technical person talking in the movie only because they use a lot of jargon that they would not<br>be able to understand. The older media did a lot of physical intrusion when it comes to<br>cybersecurity , it used to be to get into a safe they needed to hear for the click, now they need to<br>get to the server room to unlock from the twice locked safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The thing that we see in the media , is that a lot of \u201ccomputer experts\u201d just click the computerand they get into the network and will not be detected. The videos that were shown a lot of thetools that were used a lot of hackers would not be able to afford them or it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-8-journal\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/329"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/329\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/329\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}