{"id":592,"date":"2021-03-25T09:39:21","date_gmt":"2021-03-25T13:39:21","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/?p=592"},"modified":"2021-03-25T09:39:21","modified_gmt":"2021-03-25T13:39:21","slug":"unit-9-reading-mettus","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/2021\/03\/25\/unit-9-reading-mettus\/","title":{"rendered":"Unit 9 Reading &#8211; Mettus"},"content":{"rendered":"<p>The &#8220;Modular Mayhem&#8221; section of the reading discussed modular programming and also the risks of code reuse. I found the most interesting discussion to be about the benefits and risks of code reuse. It can save time and resources. However, it can undermine the security of your program. Something that likely gets overlooked by slopping developers is that any internal libraries or APIs that you&#8217;re calling can be a concern. Internal libraries were often created before security was even thought about much so there may be many vulnerabilities. Developers can research vulnerabilities for any public libraries or APIs they will use. Code reviews can be done for internal code. The big idea is that you need to know and evaluate the entire attack surface for the system and application, which can be increased by libraries, modules, and APIs called from other sources. Those risks need to be mitigated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The &#8220;Modular Mayhem&#8221; section of the reading discussed modular programming and also the risks of code reuse. I found the most interesting discussion to be about the benefits and risks of code reuse. It can save time and resources. However, it can undermine the security of your program. Something that likely gets overlooked by slopping [&hellip;]<\/p>\n","protected":false},"author":25071,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[663943],"tags":[],"class_list":{"0":"post-592","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-instructor","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts\/592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/users\/25071"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/comments?post=592"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts\/592\/revisions"}],"predecessor-version":[{"id":593,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts\/592\/revisions\/593"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/media?parent=592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/categories?post=592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/tags?post=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}