{"id":364,"date":"2024-11-11T23:24:10","date_gmt":"2024-11-11T23:24:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/?p=364"},"modified":"2024-12-08T19:31:18","modified_gmt":"2024-12-08T19:31:18","slug":"ahmed-kargbo-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/2024\/11\/11\/ahmed-kargbo-10\/","title":{"rendered":"Journal 13: Hacking For Good\u00a0"},"content":{"rendered":"\n<p>CYSE 201s<\/p>\n\n\n\n<p>Ahmed Kargbo<\/p>\n\n\n\n<p>This article simply focuses on how individuals can use their hacking skill for positive purposes. Using hacking methods positively can be used to identify and fix vulnerabilities and also protect organizations and individuals from malicious attacks.&nbsp;<\/p>\n\n\n\n<p>From the cost\/benefit policy standpoint, the article breaks down the cost of dealing with a security breach including all financial losses, company reputation damage and also legal consequences. The loss is often greater than the cost of implementing preventive measures that\u2019ll identify and fix vulnerabilities in a system. The authors argue that hiring and involving ethical hackers is a simple yet very effective low cost method depending on your budget.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 201s Ahmed Kargbo This article simply focuses on how individuals can use their hacking skill for positive purposes. Using hacking methods positively can be used to identify and fix vulnerabilities and also protect organizations and individuals from malicious attacks.&nbsp; From the cost\/benefit policy standpoint, the article breaks down the cost of dealing with a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ahmedkar1\/2024\/11\/11\/ahmed-kargbo-10\/\">Read More<\/a><\/div>\n","protected":false},"author":28578,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/posts\/364"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/users\/28578"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/comments?post=364"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/posts\/364\/revisions"}],"predecessor-version":[{"id":379,"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/posts\/364\/revisions\/379"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/media?parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/categories?post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ahmedkar1\/wp-json\/wp\/v2\/tags?post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}