{"id":3157,"date":"2023-02-14T23:03:34","date_gmt":"2023-02-15T04:03:34","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/?p=3157"},"modified":"2023-02-14T23:03:34","modified_gmt":"2023-02-15T04:03:34","slug":"weekly-disscussion-4b","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/2023\/02\/14\/weekly-disscussion-4b\/","title":{"rendered":"Weekly Disscussion 4b"},"content":{"rendered":"<p>Threat modeling is a way to stay secure online. Questions to ask is:<br \/>\nWhat do you want to protect?<br \/>\nWho do you want to protect it from?<br \/>\nHow likely is it that you will need to protect it?<br \/>\nHow bad are the consequences if you fail?<br \/>\nHow much trouble are you willing to go through in order to try to prevent those consequences?<\/p>\n<p>A way to protect yourself online is to set up two-factor authentication (2FA). It will require you to take two steps to log in. One step would be your password and the other step would be a text or email with a code to allow you to enter. There are also other ways to protect yourself like antivirus, ad blockers, back-up files, VPN etc.. I actually use VPN on my work laptop because I work from home and am connected to my home internet. The business does this to protect the files on the computer. We have a lot of data on them. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat modeling is a way to stay secure online. Questions to ask is: What do you want to protect? Who do you want to protect it from? How likely is it that you will need to protect it? How bad are the consequences if you fail? How much trouble are you willing to go through [&hellip;]<\/p>\n","protected":false},"author":27632,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[10531],"tags":[744747,555709,845088],"class_list":{"0":"post-3157","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-student-post","7":"tag-ai","8":"tag-cybersecurity","9":"tag-threat-modeling","10":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/users\/27632"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/comments?post=3157"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3157\/revisions"}],"predecessor-version":[{"id":3158,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3157\/revisions\/3158"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/media?parent=3157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/categories?post=3157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/tags?post=3157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}