{"id":2517,"date":"2015-12-22T09:49:45","date_gmt":"2015-12-22T14:49:45","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2517"},"modified":"2020-08-16T09:58:44","modified_gmt":"2020-08-16T13:58:44","slug":"week-5-it-strategy","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/week-5-it-strategy\/","title":{"rendered":"Unit #5: Creating a Security Aware Organization"},"content":{"rendered":"<p><strong>Read<\/strong> the following:<\/p>\n<ul>\n<li>Vacca Chapter e27 \u201cInformation Technology Security Management\u201d<\/li>\n<li>Vacca Chapter 33 \u201cSecurity Education, Training and Awareness\u201d<\/li>\n<li><em>SANS Reading 1: <a href=\"http:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/files\/2020\/08\/SANS-Reading1_importance-security-awareness-training-33013.pdf\">The Importance of Security Awareness training<\/a><\/em><\/li>\n<li><em>SANS Reading 2: <a href=\"http:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/files\/2017\/08\/SANS-Reading2_making-security-awareness-efforts-work-32763.pdf\">Making Security Awareness Work for You<\/a><\/em><\/li>\n<\/ul>\n<ul>\n<li><em>Optional Reading:\u00a0<a href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-100\/SP800-100-Mar07-2007.pdf\">Information Security Handbook: A Guide for Managers,<\/a> Chapter 4 \u2013 \u201cAwareness and Training\u201d, pp. 26-34<\/em><\/li>\n<\/ul>\n<p><strong>Post your answers<\/strong> to the reading\/discussion question(s)<\/p>\n<p><strong>Post your comments<\/strong> on your fellow students&#8217; posted answers<\/p>\n<p><strong>Post your <em>In the News<\/em> topic<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read the following: Vacca Chapter e27 \u201cInformation Technology Security Management\u201d Vacca Chapter 33 \u201cSecurity Education, Training and Awareness\u201d SANS Reading 1: The Importance of Security Awareness training SANS Reading 2: Making Security Awareness Work for You Optional Reading:\u00a0Information Security Handbook: A Guide for Managers, Chapter 4 \u2013 \u201cAwareness and Training\u201d, pp. 26-34 Post your answers [&hellip;]<\/p>\n","protected":false},"author":4657,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2517","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages\/2517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/users\/4657"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/comments?post=2517"}],"version-history":[{"count":7,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages\/2517\/revisions"}],"predecessor-version":[{"id":4800,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages\/2517\/revisions\/4800"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/media?parent=2517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}