{"id":310,"date":"2023-10-22T16:35:41","date_gmt":"2023-10-22T16:35:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nguma001\/?p=310"},"modified":"2023-12-08T23:05:55","modified_gmt":"2023-12-08T23:05:55","slug":"week-8-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nguma001\/2023\/10\/22\/week-8-journal-entry\/","title":{"rendered":"Week 8 Journal Entry"},"content":{"rendered":"\n<p>Nathan Guman<\/p>\n\n\n\n<p>CYSE 201S Cyber Security and Social Science<\/p>\n\n\n\n<p>Week 8 Journal Entry<\/p>\n\n\n\n<p><strong>Watch this video and pay attention to the way that movies distort hackers.<\/strong><\/p>\n\n\n\n<p><strong>Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?<\/strong><\/p>\n\n\n\n<p><strong>After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity<\/strong><\/p>\n\n\n\n<p>Seeing a man sitting at a computer, typing furiously, and saying things like \u201cI\u2019m hacking into the mainframe\u201d is a classic Hollywood trope. Almost never accurate, these depictions often confuse people and lead to alienation of the average person from the cyberworld. People end up thinking hacking is some form of magic reserved for super nerds. I think this idea is one which contributes to the lack of diversity and people willing to go into cyber-career fields. Another trope in Hollywood which is damaging is the cyber loser-hacker. The character is in some messy basement somewhere, only eating cold pizza and using technology to spite the world. &nbsp;This trope stripes dignity out of what is a growing and important professional field.<\/p>\n\n\n\n<p>On the other hand, I appreciated what the video said about credential stuffing. Hollywood can enlighten people to real threats and real vulnerabilities. The video also mentioned how they used a real-life vulnerability in a real-life software suite found only one year before the movie was released. This kind of attention to detail and real-world examples can help demystify cybercriminality and more simply explain how simple stealing information can be.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nathan Guman CYSE 201S Cyber Security and Social Science Week 8 Journal Entry Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? After watching the video, write a journal entry about how you think the media influences&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nguma001\/2023\/10\/22\/week-8-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":27517,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[3],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/310"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/users\/27517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/310\/revisions\/311"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}