{"id":276,"date":"2021-10-04T15:35:43","date_gmt":"2021-10-04T15:35:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/amali013\/?p=276"},"modified":"2021-10-04T15:35:44","modified_gmt":"2021-10-04T15:35:44","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/amali013\/2021\/10\/04\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>C<\/strong> &#8211; Cryptographer <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Y<\/strong> &#8211; You develop a new way to protect data<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>B<\/strong> &#8211; Business Aid<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>E<\/strong> &#8211; Engineer a secure and reliable software<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>R<\/strong> &#8211; Redesign faulty software<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>S<\/strong> &#8211; Safe and secure technological advances<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>E<\/strong> &#8211; Estimate dangers that are facing businesses <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>C<\/strong> &#8211; Create a Cybersecurity text book<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>U<\/strong> &#8211; Understand what needs to be done during a cyber threat<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>R<\/strong> &#8211; React to a problem and solve it<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>I<\/strong> &#8211; Include information about how to prevent attacks to businesses<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>T<\/strong> &#8211; Teach others cybersecurity<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Y<\/strong> &#8211; Yearlong service to a business for protection<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C &#8211; Cryptographer Y &#8211; You develop a new way to protect data B &#8211; Business Aid E &#8211; Engineer a secure and reliable software R &#8211; Redesign faulty software S &#8211; Safe and secure technological advances E &#8211; Estimate dangers that are facing businesses C &#8211; Create a Cybersecurity text book U &#8211; Understand&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/amali013\/2021\/10\/04\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":21590,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/posts\/276"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/users\/21590"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/posts\/276\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/posts\/276\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/media?parent=276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/categories?post=276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amali013\/wp-json\/wp\/v2\/tags?post=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}