{"id":2538,"date":"2015-12-22T10:03:34","date_gmt":"2015-12-22T15:03:34","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2538"},"modified":"2015-12-22T10:03:34","modified_gmt":"2015-12-22T15:03:34","slug":"week-12-web-application-security","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/week-12-web-application-security\/","title":{"rendered":"Week 12: Web Application Security"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Web Application Security<\/p>\n<p>\u2022 Presentation:\u00a0<\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5122sec002fall17\/files\/2017\/11\/OWASP_Top_10_Introduction_and_Remedies_2017.ppt\">http:\/\/community.mis.temple.edu\/mis5122sec002fall17\/files\/2017\/11\/OWASP_Top_10_Introduction_and_Remedies_2017.ppt<\/a><\/p>\n<p>\u2022 Activity:<\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5122sec002fall17\/files\/2017\/11\/Web-Application-Security-Exercise-1.docx\">http:\/\/community.mis.temple.edu\/mis5122sec002fall17\/files\/2017\/11\/Web-Application-Security-Exercise-1.docx<\/a><\/p>\n<p>\uf0a7 Tamper Data \uf0a7 Web Developer Toolbar \uf0a7 SQL Injection<\/p>\n<p>Readings<\/p>\n<p><a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ff648636.aspx\" target=\"_blank\" rel=\"noopener\">Web Application Security \u2013 MSDN<\/a><\/p>\n<p><a href=\"http:\/\/www.darkreading.com\/risk-management\/6-ways-to-strengthen-web-app-security\/d\/d-id\/1106197?\" target=\"_blank\" rel=\"noopener\">Securing your Web Application<\/a><\/p>\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Testing_for_SQL_Injection_(OTG-INPVAL-005)\" target=\"_blank\" rel=\"noopener\">SQL Injection<\/a><\/p>\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Top_10_2013-Top_10\" target=\"_blank\" rel=\"noopener\">OWASP Top 10 (Click into each vulnerability)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Web Application Security \u2022 Presentation:\u00a0 http:\/\/community.mis.temple.edu\/mis5122sec002fall17\/files\/2017\/11\/OWASP_Top_10_Introduction_and_Remedies_2017.ppt \u2022 Activity: http:\/\/community.mis.temple.edu\/mis5122sec002fall17\/files\/2017\/11\/Web-Application-Security-Exercise-1.docx \uf0a7 Tamper Data \uf0a7 Web Developer Toolbar \uf0a7 SQL Injection Readings Web Application Security \u2013 MSDN Securing your Web Application SQL Injection OWASP Top 10 (Click into each vulnerability)<\/p>\n","protected":false},"author":12705,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2538","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/pages\/2538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/users\/12705"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/comments?post=2538"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/pages\/2538\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5122sec002fall18\/wp-json\/wp\/v2\/media?parent=2538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}