{"id":286,"date":"2021-02-17T06:04:45","date_gmt":"2021-02-17T06:04:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mlock008\/?p=286"},"modified":"2021-02-17T06:04:46","modified_gmt":"2021-02-17T06:04:46","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mlock008\/2021\/02\/17\/journal-5\/","title":{"rendered":"Journal 5"},"content":{"rendered":"\n<p><strong>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0<\/strong><\/p>\n\n\n\n<p><strong>C&nbsp;<\/strong>alucating algorithm used security programs<\/p>\n\n\n\n<p><strong>Y&nbsp;<\/strong>ELP (Selling your reviews)<\/p>\n\n\n\n<p><strong>B\u00a0<\/strong>reaking firesticks or phones<\/p>\n\n\n\n<p><strong>E\u00a0<\/strong>ducating people in cybersecurity <\/p>\n\n\n\n<p><strong>R&nbsp;<\/strong>eading digital assets of suspected criminals&nbsp;<\/p>\n\n\n\n<p><strong>S<\/strong>&nbsp;elling cybersecurity<\/p>\n\n\n\n<p><strong>E&nbsp;<\/strong>mploying people to watch over an organization&#8217;s system<\/p>\n\n\n\n<p><strong>C<\/strong> ryptography\u00a0<\/p>\n\n\n\n<p><strong>U&nbsp;<\/strong>ncovering vulnerable on&nbsp;<\/p>\n\n\n\n<p><strong>R&nbsp;<\/strong>eassure clients of the security of their networks in cybersecurity firms<\/p>\n\n\n\n<p><strong>I&nbsp;<\/strong>nvestigating suspected malware on networks during vulnerable scans<\/p>\n\n\n\n<p><strong>T&nbsp;<\/strong>apping into unused potentials resources in a networks<\/p>\n\n\n\n<p><strong>Y&nbsp;<\/strong>acht navigation programs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0 C&nbsp;alucating algorithm used security programs Y&nbsp;ELP (Selling your reviews) B\u00a0reaking firesticks or phones E\u00a0ducating people in cybersecurity R&nbsp;eading digital assets of suspected criminals&nbsp; S&nbsp;elling cybersecurity E&nbsp;mploying people to watch over an organization&#8217;s system C ryptography\u00a0 U&nbsp;ncovering vulnerable on&nbsp; R&nbsp;eassure&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mlock008\/2021\/02\/17\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":19698,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts\/286"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/users\/19698"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts\/286\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}