{"id":356,"date":"2024-12-09T00:52:23","date_gmt":"2024-12-09T00:52:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/?page_id=356"},"modified":"2024-12-09T01:21:11","modified_gmt":"2024-12-09T01:21:11","slug":"entry-8","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/entry-8\/","title":{"rendered":"Entry #8"},"content":{"rendered":"\n<p>10\/22\/2024<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do you think the media influences our understanding about cybersecurity. <\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-text-align-left\">In some movies, they may fail to get the idea or procedures down correctly. One of the things mentioned by Keren is the bad operational security, how and where they analyze for investigation. They also tend to use made up terms in order to make things seem more scary or use terms incorrectly. Incorrect use of visual representations are also added in. An example of using terms or items incorrectly is with password boxes. While there are actual boxes for that, there are no current existing ones for computers, along with making them overpowered on movies and making them do things that are not possible in the real world. Another error most movies make is the realistic time period between an exploit. It would normally take a couple of days to plan it and carry it out correctly and successfully. Even with all the cons, made up ideas, and incorrect representations some movies still carry out successfully the real way cybersecurity or any hacking procedure works.\u00a0<span style=\"font-weight: 400\"> <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>10\/22\/2024 How do you think the media influences our understanding about cybersecurity. In some movies, they may fail to get the idea or procedures down correctly. One of the things mentioned by Keren is the bad operational security, how and where they analyze for investigation. They also tend to use made up terms in order&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/entry-8\/\">Read More<\/a><\/div>\n","protected":false},"author":29446,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages\/356"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/users\/29446"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":396,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages\/356\/revisions\/396"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/media?parent=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}