{"id":35,"date":"2024-03-27T09:52:24","date_gmt":"2024-03-27T09:52:24","guid":{"rendered":"https:\/\/student.wp.odu.edu\/bcumi001\/2024\/03\/27\/journal-entry-10\/"},"modified":"2024-03-27T09:52:24","modified_gmt":"2024-03-27T09:52:24","slug":"journal-entry-10","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/bcumi001\/2024\/03\/27\/journal-entry-10\/","title":{"rendered":"Journal Entry #10"},"content":{"rendered":"\n<p><strong>How do engineers make cyber networks safer?<\/strong><\/p>\n\n\n\n<p>Engineers can track cyber attacks on a network if there is a problem within the network per say a virus has taken control or is causing a bug to infiltrate a slower longevity within the network slowly wreaking havoc across the network. Also, engineers can see if someone has somehow managed to access a network they were not permitted to access. For example, anyone can get into someone else\u2019s WiFi network with a password. However, it\u2019s not only with a password. The primary user of the WiFi network has to accept or deny the foreign associate access to their network. In such cases, bugs and other malicious hackers can get into someone\u2019s personal information somehow and access WiFi password to gain access to someone\u2019s information if they were persistent enough to do so regardless if it was unintentional or maliciously intended. Engineers have the power to track activity within a network and even see the devices using the network and what they are doing while connected to the WiFi network as well. Engineers make sure cyber security is up to date due to the prevalence of a multitude of attacks these days. It is not always negative when an attacker gains control without permission of a network or device, but in most cases it would be better to err on the side of caution and use recommendations provided such as two factor authentication, device management within one\u2019s control center for their specific WiFi network, changing passwords every so often to make sure the same one is not being used, checking for any kind of vulnerabilities creating easy access to hackers\/scammers to get into one\u2019s information, etc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do engineers make cyber networks safer? Engineers can track cyber attacks on a network if there is a problem within the network per say a virus has taken control or is causing a bug to infiltrate a slower longevity within the network slowly wreaking havoc across the network. Also, engineers can see if someone [&hellip;]<\/p>\n","protected":false},"author":28288,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/posts\/35"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/users\/28288"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":0,"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bcumi001\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}