{"id":6620,"date":"2020-08-29T22:30:06","date_gmt":"2020-08-30T02:30:06","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6620"},"modified":"2020-08-29T22:46:25","modified_gmt":"2020-08-30T02:46:25","slug":"readings","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/08\/29\/readings\/","title":{"rendered":"Readings"},"content":{"rendered":"<p>The readings this week introduced us to the fundamentals of how a network operates.\u00a0 They presented us with a basic understanding of the hardware involved in networking and how the information is transmitted and received.\u00a0 The articles also explained how two popular networking models, OSI and TCP\/IP, function.\u00a0 From an ethical hacking standpoint, understanding these 2 models, and how information traverses the network is paramount. \u00a0A big takeaway from the readings was understanding how ports work in networking.\u00a0 As ethical hackers we will be scanning for open ports and it will be essential to know what services run on which ports so they may be further exploited.<\/p>\n<p>&nbsp;<\/p>\n<p>My question to the class:<\/p>\n<p>What ports\/services do you think will be common exploitation entry points as ethical hackers?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The readings this week introduced us to the fundamentals of how a network operates.\u00a0 They presented us with a basic understanding of the hardware involved in networking and how the information is transmitted and received.\u00a0 The articles also explained how two popular networking models, OSI and TCP\/IP, function.\u00a0 From an ethical hacking standpoint, understanding these [&hellip;]<\/p>\n","protected":false},"author":25060,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6620","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/25060"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6620"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6620\/revisions"}],"predecessor-version":[{"id":6626,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6620\/revisions\/6626"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}