{"id":251,"date":"2026-04-07T01:03:06","date_gmt":"2026-04-07T01:03:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/?p=251"},"modified":"2026-04-19T16:43:07","modified_gmt":"2026-04-19T16:43:07","slug":"journal-entry-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/2026\/04\/07\/journal-entry-8\/","title":{"rendered":"Journal Entry #8"},"content":{"rendered":"\n<p>When we watch movies or TV shows they show AI and hacking as very fast and dramatic<br>processes. It makes us think that something can get breached in seconds, that one<br>singular person can take over massive buildings with just a few keys pressed. That makes<br>great for moving a story along, but it\u2019s not actually how it works. Cybersecurity is more<br>complex and dependent on the decisions that humans make, not technology thinking for<br>itself. The video points out that AI is a important tool but it does not have intentions and<br>cannot act on its own, unlike how movies and shows depict.<br>Movies and television depict cyberattacks being immediately destructive and their<br>dangers are visible, while in reality many are more subtle and go unnoticed. This leads the<br>though that systems are either almost invincible or completely vulnerable. In reality the<br>truth is that it can be in between both and it relies heavily on the ways that we as humans<br>act along with our awareness.<br>Commonly in media sources we see hackers who appear to be geniuses because they<br>bypass an entire system alone. In real life cybersecurity involves multiple people, not just<br>one singular person. There are tools and protocols that people follow to protect from<br>hacking.<br>Television and movies shape our expectations and can even spark some interest in<br>cybersecurity. But it can lead to a lot of misunderstandings on how they function, how<br>fragile and how secure they actually are. It is important to look at real-world knowledge and<br>not just how the media portrays it to be.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we watch movies or TV shows they show AI and hacking as very fast and dramaticprocesses. It makes us think that something can get breached in seconds, that onesingular person can take over massive buildings with just a few&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/leeanne-banks\/2026\/04\/07\/journal-entry-8\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31911,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts\/251"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/users\/31911"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/comments?post=251"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts\/251\/revisions"}],"predecessor-version":[{"id":269,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/posts\/251\/revisions\/269"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/media?parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/categories?post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeanne-banks\/wp-json\/wp\/v2\/tags?post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}