{"id":6004,"date":"2018-11-29T18:18:17","date_gmt":"2018-11-29T23:18:17","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=6004"},"modified":"2018-11-29T18:18:17","modified_gmt":"2018-11-29T23:18:17","slug":"domain-name-hijacking-incidents-threats-risks-and-remedial-actions","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/11\/29\/domain-name-hijacking-incidents-threats-risks-and-remedial-actions\/","title":{"rendered":"Domain Name Hijacking: Incidents, Threats, Risks and Remedial Actions"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\"><a href=\"http:\/\/archive.icann.org\/en\/announcements\/hijacking-report-12jul05.pdf\">http:\/\/archive.icann.org\/en\/announcements\/hijacking-report-12jul05.pdf<\/a><\/span><\/p>\n<p class=\"p1\">Article: Domain Theft Strands Thousands of Web Sites<\/p>\n<p class=\"p1\">After I read this article I searched some related keywords from Google. I found a report which was published by ICANN Security and Stability Advisory Committee. In general, this report is describing domain hijacking. You all can find some useful information regarding following:<\/p>\n<p class=\"p1\">\u2013 Risk and threats associated with domain hijacking<br \/>\n\u2013 Vulnerabilities observed from domain hijackings<br \/>\n\u2013 Recovery mechanism<br \/>\n\u2013 Security measures to protect domain names<\/p>\n<p class=\"p1\">\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/archive.icann.org\/en\/announcements\/hijacking-report-12jul05.pdf Article: Domain Theft Strands Thousands of Web Sites After I read this article I searched some related keywords from Google. I found a report which was published by ICANN Security and Stability Advisory Committee. In general, this report is describing domain hijacking. You all can find some useful information regarding following: \u2013 Risk and [&hellip;]<\/p>\n","protected":false},"author":19033,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-6004","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/6004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/19033"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=6004"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/6004\/revisions"}],"predecessor-version":[{"id":6005,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/6004\/revisions\/6005"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=6004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=6004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=6004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}