{"id":380,"date":"2024-02-09T21:47:04","date_gmt":"2024-02-09T21:47:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/?p=380"},"modified":"2024-02-09T21:47:04","modified_gmt":"2024-02-09T21:47:04","slug":"journal-5-free-write","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/2024\/02\/09\/journal-5-free-write\/","title":{"rendered":"Journal #5 (free write)"},"content":{"rendered":"\n<p><strong>C<\/strong>reate a program that filters junk mail&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Y<\/strong>acht secure GPS software&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>B<\/strong>uild an application to make more secure passwords&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>E<\/strong>ducating people on cybersecurity &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>R<\/strong>educe the risk of a cyber-attack for a company by implementing a security plan &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>S<\/strong>ecuring wireless network devices &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>E<\/strong>ngineering a secure network for a company&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>C<\/strong>reate and application to help people learn security risks &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>U<\/strong>pgrade a company&#8217;s security cameras &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>R<\/strong>eview companies&#8217; security breaches and tell them how to stop them in the future &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>I<\/strong>ntegrate an attack plan for a company for if an attack happens \u00a0<\/p>\n\n\n\n<p><strong>T<\/strong>rain new people in the cybersecurity field &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Y<\/strong>ahoo email software to help you not click on suspicious sites&nbsp;<\/p>\n\n\n\n<p><strong>Y<\/strong>ahoo email software to help you not click on suspicious sites\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Create a program that filters junk mail&nbsp;&nbsp; Yacht secure GPS software&nbsp;&nbsp; Build an application to make more secure passwords&nbsp;&nbsp; Educating people on cybersecurity &nbsp;&nbsp; Reduce the risk of a cyber-attack for a company by implementing a security plan &nbsp;&nbsp; Securing wireless network devices &nbsp;&nbsp; Engineering a secure network for a company&nbsp;&nbsp; Create and application to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-cameron\/2024\/02\/09\/journal-5-free-write\/\">Read More<\/a><\/div>\n","protected":false},"author":28195,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/380"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/users\/28195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/380\/revisions"}],"predecessor-version":[{"id":381,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/380\/revisions\/381"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/media?parent=380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/categories?post=380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/tags?post=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}