{"id":291,"date":"2023-04-04T15:38:15","date_gmt":"2023-04-04T15:38:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mortonjosh\/?p=291"},"modified":"2023-04-04T15:38:15","modified_gmt":"2023-04-04T15:38:15","slug":"journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mortonjosh\/2023\/04\/04\/journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0"},"content":{"rendered":"\n<p>This is my take on the journal assignment for this week;<\/p>\n\n\n\n<p><strong>C<\/strong>ryptography usage in decryption and encryption.&nbsp;<\/p>\n\n\n\n<p><strong>Y<\/strong>outh programs for cybersecurity occupation information.&nbsp;<\/p>\n\n\n\n<p><strong>B<\/strong>iometric readings software to further authorize identities.&nbsp;<\/p>\n\n\n\n<p><strong>E<\/strong>ngineer programs to prevent cyber attacks.&nbsp;<\/p>\n\n\n\n<p><strong>R<\/strong>esearch frameworks and techniques for better protecting data.&nbsp;<\/p>\n\n\n\n<p><strong>S<\/strong>ecure servers housing organizational data.&nbsp;<\/p>\n\n\n\n<p><strong>E<\/strong>xecute frameworks to prevent cyber risks.&nbsp;<\/p>\n\n\n\n<p><strong>C<\/strong>reate an app that may rank different software in terms of security.<\/p>\n\n\n\n<p><strong>U<\/strong>ser verification software and algorithms.&nbsp;<\/p>\n\n\n\n<p><strong>R<\/strong>estore lost data from attacks.<\/p>\n\n\n\n<p><strong>I<\/strong>ntegrate better security techniques in everything you do online.<\/p>\n\n\n\n<p><strong>T<\/strong>ake an inventory of computers and data within a system.&nbsp;<br><strong>Y<\/strong>achters using GPS software that is secure. <strong>&nbsp;<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is my take on the journal assignment for this week; Cryptography usage in decryption and encryption.&nbsp; Youth programs for cybersecurity occupation information.&nbsp; Biometric readings software to further authorize identities.&nbsp; Engineer programs to prevent cyber attacks.&nbsp; Research frameworks and techniques for better protecting data.&nbsp; Secure servers housing organizational data.&nbsp; Execute frameworks to prevent cyber risks.&nbsp; &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/2023\/04\/04\/journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0<\/span><\/a><\/p>\n","protected":false},"author":25751,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/users\/25751"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}