{"id":280,"date":"2021-10-04T03:15:53","date_gmt":"2021-10-04T03:15:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/munteansoul\/?p=280"},"modified":"2021-10-04T03:15:54","modified_gmt":"2021-10-04T03:15:54","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/munteansoul\/2021\/10\/04\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0<\/p>\n\n\n\n<p><strong>C<\/strong>reate an improved software for data description <\/p>\n\n\n\n<p><strong>Yacht<\/strong>\u00a0software that designs the body of the ship to be more lightweight for speed while carry bigger load<\/p>\n\n\n\n<p><strong>B<\/strong>iometric scanning software needs to be encrypted because personal information \u00a0<\/p>\n\n\n\n<p><strong>Embezzlement<\/strong>\u00a0detector to stop illegal activity\u00a0<\/p>\n\n\n\n<p><strong>R<\/strong>estoring a company&#8217;s cyber system after a cyber attack. <\/p>\n\n\n\n<p><strong>S<\/strong>oftware that automatically doses penetration testing and fixes the problem <\/p>\n\n\n\n<p><strong>E<\/strong>ncrypting your private information and web camera with a simple command<\/p>\n\n\n\n<p><strong>C<\/strong>reating a risk-free program to practice hacking ethically <\/p>\n\n\n\n<p><strong>U<\/strong>ninstalling unused programs files to free space and ram.<\/p>\n\n\n\n<p><strong>R<\/strong>estoring information that was hacked or stolen<\/p>\n\n\n\n<p><strong>I<\/strong>nterface machine that puts us in augmented reality <\/p>\n\n\n\n<p><strong>T<\/strong>rack any suspicious activity <\/p>\n\n\n\n<p>Yacht software to self-drive vessel <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0 Create an improved software for data description Yacht\u00a0software that designs the body of the ship to be more lightweight for speed while carry bigger load Biometric scanning software needs to be encrypted because personal information \u00a0 Embezzlement\u00a0detector to stop&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/munteansoul\/2021\/10\/04\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":21339,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0,"wds_primary_avhec_catgroup":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/posts\/280"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/users\/21339"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/comments?post=280"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/posts\/280\/revisions"}],"predecessor-version":[{"id":281,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/posts\/280\/revisions\/281"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/media?parent=280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/categories?post=280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/tags?post=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}