{"id":6813,"date":"2020-10-25T22:52:47","date_gmt":"2020-10-26T02:52:47","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6813"},"modified":"2020-10-25T22:52:47","modified_gmt":"2020-10-26T02:52:47","slug":"week-9-readings-owasp-top-10","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/10\/25\/week-9-readings-owasp-top-10\/","title":{"rendered":"Week 9 Readings \u2013 OWASP Top 10"},"content":{"rendered":"<p>This week\u2019s readings had us view the OWASP top 10.\u00a0 The OWASP (Open Web Application Security Project) is a super informative site.\u00a0 It essentially outlines the top 10 web attacks the attackers are utilizing against web servers today.\u00a0 This is useful as it gives you an idea of how attackers are exploiting environments.\u00a0 It also helps IT departments assess their own externally facing servers for vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n<p>Questions for the class:<\/p>\n<p>SQL Injection is the number 1 threat on the OWASP top 10, how do SQL injections work?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s readings had us view the OWASP top 10.\u00a0 The OWASP (Open Web Application Security Project) is a super informative site.\u00a0 It essentially outlines the top 10 web attacks the attackers are utilizing against web servers today.\u00a0 This is useful as it gives you an idea of how attackers are exploiting environments.\u00a0 It also [&hellip;]<\/p>\n","protected":false},"author":25060,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[805939],"tags":[],"class_list":{"0":"post-6813","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-09-malware","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/25060"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6813"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6813\/revisions"}],"predecessor-version":[{"id":6814,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6813\/revisions\/6814"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}