{"id":6659,"date":"2020-09-13T16:09:15","date_gmt":"2020-09-13T20:09:15","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6659"},"modified":"2020-09-13T16:11:06","modified_gmt":"2020-09-13T20:11:06","slug":"6659","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/09\/13\/6659\/","title":{"rendered":"Summary of Readings !"},"content":{"rendered":"<p>This week\u2019s reading article emphasized on the importance of vulnerability management program in any organization. \u00a0Specific importance was given into difficulties organizations face in choosing their business partners.\u00a0 We have seen over the years that hackers target vendors\/business partners to gain an entry into the target organization.\u00a0 This article provided a brief introduction to open source tools which can be used to get the necessary information about vendors\u2019\/ business partners\u2019 strength and security of IT systems, without disrupting relations. Information obtained using these open source vulnerability assessment tools can help organizations in making informed decisions regarding their business partners.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s reading article emphasized on the importance of vulnerability management program in any organization. \u00a0Specific importance was given into difficulties organizations face in choosing their business partners.\u00a0 We have seen over the years that hackers target vendors\/business partners to gain an entry into the target organization.\u00a0 This article provided a brief introduction to open [&hellip;]<\/p>\n","protected":false},"author":22929,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6659","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/22929"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6659"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6659\/revisions"}],"predecessor-version":[{"id":6664,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6659\/revisions\/6664"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}