{"id":333,"date":"2025-04-29T21:16:51","date_gmt":"2025-04-29T21:16:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/michaelapayne\/?page_id=333"},"modified":"2025-04-30T02:10:33","modified_gmt":"2025-04-30T02:10:33","slug":"journals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/journals\/","title":{"rendered":"Journals Contd."},"content":{"rendered":"<h3>Journal #6<\/h3>\n<p><strong>Prompt: <\/strong><strong>Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The first fake website is a website posing as Amazon. The difference between the real<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Amazon site and the fake \u201cAmazon\u201d site is the URL. The URL in the fake site has an \u201cx\u201d<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">at the end of &#8220;amazon,&#8221; so it reads &#8220;amazonx.com.\u201d This small difference can go<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">unnoticed, causing someone to use this fake website.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The other fake website has the same URL as the real website except it is missing the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201csecure\u201d in hypertext transfer protocol. So the website says http instead of https, making<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">it less secure and likely to be fake\/unreliable.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Another fake website imitated a Honda Canadian site selling Honda lawnmowers for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">80%-90% off. The real website did not have discounts that low. If a website is selling<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">something for a suspiciously low price or at a price that seems too good to be true, it is<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more than likely a fake.<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<h3>Journal #7<\/h3>\n<p><strong>Prompt: Review the following photos through a human-centered cybersecurity framework.\u00a0Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Image #1<\/span><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-340\" src=\"http:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174158-300x196.png\" alt=\"\" width=\"300\" height=\"196\" srcset=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174158-300x196.png 300w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174158-459x300.png 459w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174158.png 624w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<div><span style=\"font-weight: 400\">In this image, a hacker is hacking into someone\u2019s account, and they have retrieved the password but don\u2019t realize it because the password is 8 asterisks, causing it to appear censored.<\/span><\/div>\n<div>\u00a0<\/div>\n<\/div>\n<div>Image #2<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-341\" src=\"http:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174316-300x198.png\" alt=\"\" width=\"300\" height=\"198\" srcset=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174316-300x198.png 300w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174316-454x300.png 454w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174316.png 621w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<div><span style=\"font-weight: 400\">In this image, the people are jumping for joy realizing they won\u2019t fall for scam emails anymore.<\/span><\/div>\n<div>\u00a0<\/div>\n<div>Image #3<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-342\" src=\"http:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174417-300x198.png\" alt=\"\" width=\"300\" height=\"198\" srcset=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174417-300x198.png 300w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174417-455x300.png 455w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2025\/04\/Screenshot-2025-04-29-174417.png 622w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<div><span style=\"font-weight: 400\">In this image, a guy is chilling because the hacker is struggling to launch an attack on him with his VPN. <\/span><\/div>\n<div>\u00a0<\/div>\n<h3>Journal #8<\/h3>\n<p><strong>Prompt: Write a journal entry about how you think the media influences our understanding about cybersecurity.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">There are some aspects of cybersecurity in the media that are true, but I feel for the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most part, how cybersecurity is presented to the public is not realistic. For example,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">because of the media, the term \u201chacker\u201d has a negative connotation, causing people to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">only think of hackers as criminals when there are ethical hackers as well, such as \u201cwhite<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hat hackers.\u201d In the video, the lady also mentions how in these shows and movies, the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">characters are mainly using made-up terms, doing things incorrectly, or doing things<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">with computers brought in for investigation that may be considered dangerous or not<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">smart. Some methods shown in media, such as \u201cspear phishing\u201d or games like &#8220;CTF,&#8221;<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">are pretty realistic.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<h3 class=\"PDFAnnotationLayer-container\">Journal #9<\/h3>\n<p><strong>Prompt: <\/strong><strong>Complete the\u00a0<span class=\"instructure_file_holder link_holder instructure_file_link_holder\"><a class=\"inline_disabled preview_in_overlay\" title=\"Social Media Disorder Scale.pdf\" href=\"https:\/\/canvas.odu.edu\/courses\/177764\/files\/44954657?wrap=1\" target=\"_blank\" rel=\"noopener\" data-canvas-previewable=\"false\" data-api-endpoint=\"https:\/\/canvas.odu.edu\/api\/v1\/courses\/177764\/files\/44954657\" data-api-returntype=\"File\">Social Media Disorder scale<\/a><a class=\"file_download_btn\" role=\"button\" href=\"https:\/\/canvas.odu.edu\/courses\/177764\/files\/44954657\/download?download_frd=1\"><span role=\"presentation\">\u00a0<\/span><span class=\"screenreader-only\">Download Social Media Disorder scale <\/span><\/a><\/span>How did you score?\u00a0What do you think about the items in the scale?\u00a0Why do you think that different patterns are found across the world?<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I scored 1\/9 on the social media disorder scale. I thought some of the items on the scale<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">were relatable and that the others were kind of crazy. I understand some people have<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">experienced things such as arguing with family or friends because of their social media<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">usage, but it hasn\u2019t been a thing for me, so I just thought that was a little crazy. I related<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">with some things like the persistence and displacement portions of the scale, but the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scale asked if those things regularly happened and it is just a \u201chere and there\u201d thing for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">me; I do not regularly neglect other activities to use social media, etc.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I think different patterns are found across the world because of the access to technology<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and social media and because of different cultures. A country that does not use<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technology a lot generally will not relate to many things on this scale.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<h3 class=\"PDFAnnotationLayer-container\">Journal #10<\/h3>\n<p><strong>Prompt: <\/strong><strong>Read this and write a journal entry summarizing your response to the article on social cybersecurity \u00a0<a class=\"external\" href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b<span class=\"external_link_icon\" role=\"presentation\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a><\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article explains how social cybersecurity is an emerging domain that will a<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ff<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ect the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">future of our warfare. Social cybersecurity focuses on human behavior and \u201chacking\u201d<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">humans, while traditional cybersecurity focuses on humans \u201chacking\u201d technology. Over<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the past few years, information has become decentralized, and now a lot of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organizations control the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">fl<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ow of information that is distributed to society. The article<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">mentions how \u201cit is imperative for leaders to understand social cybersecurity to defend<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">internal weaknesses against external manipulation.\u201d Social cybersecurity is a vital<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">discipline for our future, and it is important that our military and society are educated<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">about the decentralized modern information and the risks involved. Lastly, the article<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">mentions that because social cybersecurity is multidisciplinary, \u201cwe must develop a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">multidisciplinary approach to cybersecurity.\u201d<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<h3>\u00a0<\/h3>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1-1024x576.jpg\" alt=\"\" class=\"wp-image-85\" style=\"width:569px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1-1024x576.jpg 1024w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-buttons is-content-justification-space-between is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/\">Back<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/journals-contd\/\">Next <\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Journal #6 Prompt: Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent. The first fake website is a website posing as Amazon. The difference between the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/journals\/\">Read More<\/a><\/div>\n","protected":false},"author":30410,"featured_media":0,"parent":141,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/users\/30410"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/333\/revisions"}],"predecessor-version":[{"id":382,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/333\/revisions\/382"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/141"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/media?parent=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}