{"id":214,"date":"2022-04-24T21:04:41","date_gmt":"2022-04-24T21:04:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/?p=214"},"modified":"2022-04-24T21:04:41","modified_gmt":"2022-04-24T21:04:41","slug":"ep-blog-post-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/2022\/04\/24\/ep-blog-post-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"eP Blog Post 5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity."},"content":{"rendered":"\n<p><strong>C<\/strong>ryptocurrency procurement and security consulting.<br><strong>Y<\/strong>ouTube Content Creator discussing cybersecurity topics.<br><strong>B<\/strong>uilding firewalls for businesses in effort to prevent foreign intrusions. <br><strong>E<\/strong>nforcement against cybercrime via a career in Law Enforcement Information Technologies. <br><strong>R<\/strong>ecreate and defeat significant cyber attacks to systems for training purposes. <br><strong>S<\/strong>urveillance System that can ward off unauthorized tampering of secured systems. <br><strong>E<\/strong>lect politicians focused on improving or bettering protections afforded by cybersecurity.<br><strong>C<\/strong>ybercrime personnel investigating unlawful, fraudulent cyber activities.<br><strong>U<\/strong>ncover fraud rings siphoning user&#8217;s personal data.<br><strong>R<\/strong>eact to intrusive cyber attacks\/events as they occur while working for a business as IT. <br><strong>I<\/strong>ntern as a cybersecurity analyst for big businesses like Google or IBM. <br><strong>T<\/strong>each others cybersecurity in college or high school as a teacher\/professor. <br><strong>Y<\/strong>outh training of cyber protections to their gaming consoles or systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency procurement and security consulting.YouTube Content Creator discussing cybersecurity topics.Building firewalls for businesses in effort to prevent foreign intrusions. Enforcement against cybercrime via a career in Law Enforcement Information Technologies. Recreate and defeat significant cyber attacks to systems for training&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/2022\/04\/24\/ep-blog-post-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":23111,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/posts\/214"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/users\/23111"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/posts\/214\/revisions"}],"predecessor-version":[{"id":221,"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/posts\/214\/revisions\/221"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/media?parent=214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/categories?post=214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuaaurelio\/wp-json\/wp\/v2\/tags?post=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}