{"id":333,"date":"2023-04-24T23:45:14","date_gmt":"2023-04-24T23:45:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/timothyklein\/?p=333"},"modified":"2023-04-24T23:45:14","modified_gmt":"2023-04-24T23:45:14","slug":"cyse-201s-journal-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/timothyklein\/2023\/04\/24\/cyse-201s-journal-8\/","title":{"rendered":"CYSE 201S Journal 8"},"content":{"rendered":"\n<p>As highlighted by the extremely accomplished Keren Elazari there tends to be a wide gap in how cybersecurity is represented in media and actual operational security. The directors and those behind the media often times have literally no concern for the proper method to show cybersecurity in their film. There is typically even completely made-up lingo and jargon in these media examples. Terms like &#8220;Omega Site&#8221; are not even real and are just used for dramatic effect. Media often times completely compromises intellectual integrity for dramatic effect. For many people, the exposure to concepts in cyber security they shown in movies is their primary or even only source of &#8220;education&#8221; on the topic. This being the case that people are given completely false information then their entire idea of cybersecurity is incorrect for the very start. This compromises the induvial security of many people in society as they are not challenged to review their beliefs on the matter until they are confronted with a form of cybercrime within their own life. Many times, this can be too late as the loss of critical assets may be their introduction to real world cybercrime. Given how the misinformation can have very real-world consequences there should be a stronger endevor to showcasing good cybersecurity practices within media. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>As highlighted by the extremely accomplished Keren Elazari there tends to be a wide gap in how cybersecurity is represented in media and actual operational security. The directors and those behind the media often times have literally no concern for the proper method to show cybersecurity in their film. There is typically even completely made-up&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/timothyklein\/2023\/04\/24\/cyse-201s-journal-8\/\">Read More<\/a><\/div>\n","protected":false},"author":24584,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/posts\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/users\/24584"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/posts\/333\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/posts\/333\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/media?parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/categories?post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timothyklein\/wp-json\/wp\/v2\/tags?post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}