{"id":373,"date":"2024-02-25T23:16:17","date_gmt":"2024-02-25T23:16:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mgree035\/?p=373"},"modified":"2024-02-25T23:17:39","modified_gmt":"2024-02-25T23:17:39","slug":"week-7-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mgree035\/2024\/02\/25\/week-7-journal-entry\/","title":{"rendered":"Week 7 &#8211; Journal Entry"},"content":{"rendered":"\n<p><strong>Create a meme for your favorite three [images], explaining what is going on in the individual or individuals&#8217; mind(s).  Explain how your memes relate to human-centered cybersecurity.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/cs_education_meme.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"506\" src=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/cs_education_meme.jpg\" alt=\"\" class=\"wp-image-374\" style=\"width:891px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/cs_education_meme.jpg 800w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/cs_education_meme-300x190.jpg 300w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/cs_education_meme-768x486.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n\n\n\n<p>An important aspect\/characteristic\/necessity in human-centered cybersecurity is the knowledge of the individual accessing the device or network.  If individuals are not properly and\/or thoroughly educated about the best practices, potential risks, and importance of using strong identifiers &amp; passwords, then it will be virtually impossible to remain safe.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-1024x683.jpg\" alt=\"\" class=\"wp-image-375\" style=\"width:890px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-2048x1365.jpg 2048w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/user_experience_meme-1140x760.jpg 1140w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Another significant aspect of human-centered cybersecurity is convenience\u2014specifically, convenience in terms of how easily an individual can adopt\/adhere to the required safety measures, mitigating risk to the well-being of the individual or the network they are on.  MFA is one of the simplest, but effective, ways to help ensure the safety of a network or device.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-768x1024.jpg\" alt=\"\" class=\"wp-image-376\" style=\"width:447px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-768x1024.jpg 768w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-1152x1536.jpg 1152w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-1536x2048.jpg 1536w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-1140x1520.jpg 1140w, https:\/\/sites.wp.odu.edu\/mgree035\/wp-content\/uploads\/sites\/33422\/2024\/02\/phishing_meme-scaled.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><\/figure><\/div>\n\n\n<p>When an individual is educated about potential risks and consequences associated with internet access, such as phishing, pharming, etc., avoiding these risks becomes relatively easy.  A good education on what to watch for makes it conveniently easy for individuals to navigate online threats.  <\/p>\n\n\n\n<p>For context(to avoid any type of conflict), by &#8220;threw that ish back,&#8221; I mean throwing the line back relating to fishing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Create a meme for your favorite three [images], explaining what is going on in the individual or individuals&#8217; mind(s). Explain how your memes relate to human-centered cybersecurity. An important aspect\/characteristic\/necessity in human-centered cybersecurity is the knowledge of the individual accessing the device or network. If individuals are not properly and\/or thoroughly educated about the best &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/mgree035\/2024\/02\/25\/week-7-journal-entry\/\">Continue reading<\/a><\/p>\n","protected":false},"author":26743,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/373"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/users\/26743"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/comments?post=373"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/373\/revisions"}],"predecessor-version":[{"id":378,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/373\/revisions\/378"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/media?parent=373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/categories?post=373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/tags?post=373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}