{"id":3677,"date":"2016-10-17T19:28:13","date_gmt":"2016-10-17T23:28:13","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3677"},"modified":"2016-10-17T19:28:13","modified_gmt":"2016-10-17T23:28:13","slug":"encryption-a-backdoor-for-one-is-a-backdoor-for-all","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/17\/encryption-a-backdoor-for-one-is-a-backdoor-for-all\/","title":{"rendered":"Encryption: A Backdoor For One Is A Backdoor For All"},"content":{"rendered":"<p>This article talks about how important encryption is in today&#8217;s internet-driven economy. \u00a0Any attempt to circumvent encryption measures will eventually leave systems vulnerable to unwarranted attack by malicious actors. \u00a0Companies, organizations, ethical hackers, and software developers who leaves back doors in their systems or programs are potentially giving the threat agents another vector to attack the system.<\/p>\n<p>Read More on the Article here:\u00a0http:\/\/www.darkreading.com\/attacks-breaches\/encryption-a-backdoor-for-one-is-a-backdoor-for-all\/a\/d-id\/1327177?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article talks about how important encryption is in today&#8217;s internet-driven economy. \u00a0Any attempt to circumvent encryption measures will eventually leave systems vulnerable to unwarranted attack by malicious actors. \u00a0Companies, organizations, ethical hackers, and software developers who leaves back doors in their systems or programs are potentially giving the threat agents another vector to attack [&hellip;]<\/p>\n","protected":false},"author":8346,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3677","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/8346"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3677"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3677\/revisions"}],"predecessor-version":[{"id":3678,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3677\/revisions\/3678"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}