{"id":294,"date":"2024-03-04T23:43:10","date_gmt":"2024-03-04T23:43:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/?p=294"},"modified":"2024-03-04T23:43:10","modified_gmt":"2024-03-04T23:43:10","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/2024\/03\/04\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.<\/p>\n\n\n\n<p><strong>C<\/strong>ybersecurity consulting<\/p>\n\n\n\n<p><strong>Y<\/strong>acht security systems<\/p>\n\n\n\n<p><strong>B<\/strong>ug bounty hunting<\/p>\n\n\n\n<p><strong>E<\/strong>ncryption services<\/p>\n\n\n\n<p><strong>R<\/strong>isk assessment<\/p>\n\n\n\n<p><strong>S<\/strong>ecurity training<\/p>\n\n\n\n<p><strong>E<\/strong>ndpoint protection<\/p>\n\n\n\n<p><strong>C<\/strong>ybersecurity auditing<\/p>\n\n\n\n<p><strong>U<\/strong>nified security systems<\/p>\n\n\n\n<p><strong>R<\/strong>egulatory compliance services<\/p>\n\n\n\n<p><strong>I<\/strong>ncident response services<\/p>\n\n\n\n<p><strong>T<\/strong>hreat intelligence platforms<\/p>\n\n\n\n<p><strong>Y<\/strong>ouTube channel on cybersecurity tutorials<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Cybersecurity consulting Yacht security systems Bug bounty hunting Encryption services Risk assessment Security training Endpoint protection Cybersecurity auditing Unified security systems Regulatory compliance services Incident response services Threat intelligence platforms YouTube channel on cybersecurity tutorials<\/p>\n","protected":false},"author":28263,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/users\/28263"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts\/294\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}