{"id":271,"date":"2021-12-10T21:52:22","date_gmt":"2021-12-10T21:52:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyt200t\/?p=271"},"modified":"2021-12-10T21:52:22","modified_gmt":"2021-12-10T21:52:22","slug":"journal-entry-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyt200t\/2021\/12\/10\/journal-entry-5\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"\n<p>C-create affordable yet effective protective software for the average person to purchase<\/p>\n\n\n\n<p>Y-Youth training program in teaching young teens that are interested in cybersecurity<\/p>\n\n\n\n<p>B- Become a cybersecurity expert for a corporate business<\/p>\n\n\n\n<p>E- Encryption services for high profile personalities(celebs)<\/p>\n\n\n\n<p>R-Restoring files or lost information, for victims of a cyber attack<\/p>\n\n\n\n<p>S-Self Recognition as an authentication method<\/p>\n\n\n\n<p>E-Extortion prevention online <\/p>\n\n\n\n<p>C- Child Pornography detection <\/p>\n\n\n\n<p>U-Unauthorized online access detection <\/p>\n\n\n\n<p>R-Recovery of lost passwords, passkeys, and emails. <\/p>\n\n\n\n<p>I- Insurance fraud prevention<\/p>\n\n\n\n<p>T-Tracking cybercriminals by creating a digital footprint <\/p>\n\n\n\n<p>Y- Yearly upgrading technology for major businesses<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C-create affordable yet effective protective software for the average person to purchase Y-Youth training program in teaching young teens that are interested in cybersecurity B- Become a cybersecurity expert for a corporate business E- Encryption services for high profile personalities(celebs) R-Restoring files or lost information, for victims of a cyber attack S-Self Recognition as an&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyt200t\/2021\/12\/10\/journal-entry-5\/\">Read More<\/a><\/div>\n","protected":false},"author":21506,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/posts\/271"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/users\/21506"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"predecessor-version":[{"id":272,"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/posts\/271\/revisions\/272"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyt200t\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}