{"id":208,"date":"2024-04-23T04:05:56","date_gmt":"2024-04-23T04:05:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ebrad0072\/?p=208"},"modified":"2024-04-23T04:05:56","modified_gmt":"2024-04-23T04:05:56","slug":"journal-entry-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ebrad0072\/2024\/04\/23\/journal-entry-5\/","title":{"rendered":"Journal entry 5"},"content":{"rendered":"\n<p>C \u2013 Consulting and evaluating for cybersecurity risk assessments and mitigation strategies.<\/p>\n\n\n\n<p>Y \u2013 Yielding profits through &nbsp;legal hacking like testing a company\u2019s security .<\/p>\n\n\n\n<p>B \u2013 Building and selling &nbsp;protected messaging tools or encrypted apps .<\/p>\n\n\n\n<p>E \u2013 Establishing a web platform for cybersecurity training or teaching courses online.<\/p>\n\n\n\n<p>R \u2013 Running a blog or video blog about cybersecurity and earn from ads, sponsors, or affiliate links.<\/p>\n\n\n\n<p>S \u2013 Selling cybersecurity software solutions, such as antivirus programs or firewall systems.<\/p>\n\n\n\n<p>E \u2013 Engagingv in reward programs to locate and report software flaws for cash prizes<\/p>\n\n\n\n<p>C \u2013 Creating and selling hardware that protects data, such as secure USB sticks or routers with encryption.<\/p>\n\n\n\n<p>U \u2013 Utilizing cybersecurity know-how to help organizations respond to online threats they\u2019re facing.<\/p>\n\n\n\n<p>R \u2013 Reselling products or services related to cyberguarding<\/p>\n\n\n\n<p>I \u2013 Investing in cybersecurity startups or companies developing innovative security technologies.<\/p>\n\n\n\n<p>T \u2013 Taking on &nbsp;cybersecurity gigs like checking for digital vulnerabilities or beefing up clients\u2019 cyber defenses.<\/p>\n\n\n\n<p>Y \u2013 Yielding income by giving big companies or government bodies cybersecurity advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C \u2013 Consulting and evaluating for cybersecurity risk assessments and mitigation strategies. Y \u2013 Yielding profits through &nbsp;legal hacking like testing a company\u2019s security . B \u2013 Building and selling &nbsp;protected messaging tools or encrypted apps . E \u2013 Establishing a web platform for cybersecurity training or teaching courses online. R \u2013 Running a blog [&hellip;]<\/p>\n","protected":false},"author":28433,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/posts\/208"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/users\/28433"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/comments?post=208"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/posts\/208\/revisions"}],"predecessor-version":[{"id":209,"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/posts\/208\/revisions\/209"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/media?parent=208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/categories?post=208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ebrad0072\/wp-json\/wp\/v2\/tags?post=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}