{"id":295,"date":"2024-04-17T16:42:50","date_gmt":"2024-04-17T16:42:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jnath-003\/?p=295"},"modified":"2024-04-17T16:42:50","modified_gmt":"2024-04-17T16:42:50","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jnath-003\/2024\/04\/17\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p><strong>C<\/strong>reating a mechanism that makes a strong password.<\/p>\n\n\n\n<p><b>Y<\/b>oga company; creating a framework for their company&#8217;s data<\/p>\n\n\n\n<p><strong>B<\/strong>uilding computers <\/p>\n\n\n\n<p><strong>E<\/strong>rasing data on devices that is faulty of carries viruses.<\/p>\n\n\n\n<p><strong>R<\/strong>emoving viruses from computers <\/p>\n\n\n\n<p><strong>S<\/strong>ending data company wide to employees regarding cybersecurity issues<\/p>\n\n\n\n<p><strong>E<\/strong>thically hacking computers to find information <\/p>\n\n\n\n<p><b>C<\/b>ontrolling a control server that communicates with users and control any compromised computers in the network<\/p>\n\n\n\n<p><strong>U<\/strong>sing your cybersecurity degree to find a job<\/p>\n\n\n\n<p><strong>R<\/strong>everse social engineer attacking in an ethical way<\/p>\n\n\n\n<p><strong>I<\/strong>nitiating a backdoor trap on hackers to get into their systems and retrieve any data stolen. <\/p>\n\n\n\n<p><strong>T<\/strong>aking your own initiative and starting a company that deals with refurbishing and reverse hacking compromised computers so that they&#8217;re functional again.<\/p>\n\n\n\n<p><strong>Yo<\/strong>u can work for a company that makes communication devices that go in phones\/other communication devices<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Creating a mechanism that makes a strong password. Yoga company; creating a framework for their company&#8217;s data Building computers Erasing data on devices that is faulty of carries viruses. Removing viruses from computers Sending data company wide to employees regarding cybersecurity issues Ethically hacking computers to find information Controlling a control server that communicates with&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jnath-003\/2024\/04\/17\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":28421,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/users\/28421"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jnath-003\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}