{"id":246,"date":"2025-03-03T04:13:23","date_gmt":"2025-03-03T04:13:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mahad\/?p=246"},"modified":"2025-03-03T04:13:23","modified_gmt":"2025-03-03T04:13:23","slug":"week-7-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mahad\/2025\/03\/03\/week-7-journal-entry\/","title":{"rendered":"Week 7 &#8211; Journal Entry"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image.png\" alt=\"\" class=\"wp-image-247\" style=\"width:485px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image.png 750w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-300x200.png 300w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-600x400.png 600w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/a><\/figure>\n\n\n\n<p>Users often ignore or forget security policies due to habit and convenience. Even after training, people may still choose weak passwords because they believe they won\u2019t be targeted. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"487\" height=\"324\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-1.png\" alt=\"\" class=\"wp-image-248\" style=\"width:612px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-1.png 487w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-1-300x200.png 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/a><\/figure>\n\n\n\n<p>People are becoming more aware of phishing scams but still hesitate to trust their instincts. Social engineering attacks prey on urgency and authority (like fake CEO emails).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-2.png\" alt=\"\" class=\"wp-image-249\" style=\"width:585px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-2.png 750w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-2-300x200.png 300w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-2-600x400.png 600w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/a><\/figure>\n\n\n\n<p>Employees often unintentionally expose sensitive company data due to poor cybersecurity practices. Using public Wi-Fi or weak passwords can lead to massive data breaches.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-4.png\" alt=\"\" class=\"wp-image-251\" style=\"width:593px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-4.png 666w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-4-300x225.png 300w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-4-600x450.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/><\/a><\/figure>\n\n\n\n<p>Even the best security measures can\u2019t prevent human error. Social engineering (like phishing) is one of the biggest cybersecurity risks because it exploits human behavior. Organizations invest in technical security controls, but lack of user awareness often leads to breaches.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-5.png\" alt=\"\" class=\"wp-image-252\" style=\"width:561px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-5.png 750w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-5-300x200.png 300w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-5-600x400.png 600w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/a><\/figure>\n\n\n\n<p>Phishing remains one of the biggest cybersecurity threats because people tend to trust emails that look official. Employees often ignore security training, thinking, &#8220;It won\u2019t happen to me.&#8221;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"666\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-6.png\" alt=\"\" class=\"wp-image-253\" style=\"width:373px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-6.png 500w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-6-225x300.png 225w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n\n\n\n<p>Scammers use excitement and urgency to make people ignore red flags. Even when users recognize a potential scam, curiosity or FOMO (fear of missing out) can override caution.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"750\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-7.png\" alt=\"\" class=\"wp-image-254\" style=\"width:375px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-7.png 500w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-7-200x300.png 200w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n\n\n\n<p>Hackers use publicly available social media info to answer security questions, reset passwords, or craft personalized phishing attacks. Oversharing makes social engineering easier, as attackers can guess interests, routines, and even login credentials.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"552\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-8.png\" alt=\"\" class=\"wp-image-255\" style=\"width:346px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-8.png 500w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-8-272x300.png 272w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n\n\n\n<p>Malware or ransomware attacks often result in a black screen, locking users out of their systems. People click on suspicious links out of curiosity, ignoring cybersecurity warnings.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"790\" height=\"499\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-9.png\" alt=\"\" class=\"wp-image-256\" style=\"width:638px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-9.png 790w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-9-300x189.png 300w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-9-768x485.png 768w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-9-600x379.png 600w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><\/a><\/figure>\n\n\n\n<p>Live demos are more effective than emails, but only if people actually pay attention. Security awareness training is crucial, but if it\u2019s not engaging, people won\u2019t absorb the information.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-10.png\" alt=\"\" class=\"wp-image-257\" style=\"width:562px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-10.png 751w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-10-300x200.png 300w, https:\/\/sites.wp.odu.edu\/mahad\/wp-content\/uploads\/sites\/38155\/2025\/03\/image-10-600x399.png 600w\" sizes=\"(max-width: 751px) 100vw, 751px\" \/><\/a><\/figure>\n\n\n\n<p>Smartphone photos contain metadata (EXIF data), including location info, which can be exploited by cybercriminals. Many users don\u2019t realize their social media posts reveal where they are, making them vulnerable to stalking or theft.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Users often ignore or forget security policies due to habit and convenience. Even after training, people may still choose weak passwords because they believe they won\u2019t be targeted. People are becoming more aware of phishing scams but still hesitate to&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/mahad\/2025\/03\/03\/week-7-journal-entry\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30064,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts\/246"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/users\/30064"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":258,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts\/246\/revisions\/258"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}