{"id":3122,"date":"2017-05-15T09:39:50","date_gmt":"2017-05-15T13:39:50","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5903sec011s17\/?page_id=3122"},"modified":"2017-05-15T11:45:03","modified_gmt":"2017-05-15T15:45:03","slug":"in-the-news","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/in-the-news\/","title":{"rendered":"In the News Article"},"content":{"rendered":"<p>Research, identify, write a summary, post a link to your summary, and be prepared to discuss in class an article you found about a current event in the Information Security arena. An ideal article would be tied thematically to the topic of the week.\u00a0 However, any article you find interesting and would like to share is welcome. The deadline for posting for most weeks is \u00a0Tuesday @ 11:59am. (see exception noted \u2018*\u2019) \u00a0Below is the schedule for your \u201c<em>In the News\u201d<\/em> submittals:<\/p>\n<table style=\"width: 667px;\">\n<tbody>\n<tr style=\"height: 10px;\">\n<td style=\"width: 82px; text-align: center;\"><strong>Class #<\/strong><\/td>\n<td style=\"width: 430.273px; text-align: center;\"><strong>Topic of the Week<\/strong><\/td>\n<td style=\"width: 137.727px; text-align: center;\"><strong>Due<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">2<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Cybercrime<\/td>\n<td style=\"width: 137.727px; text-align: center;\">5\/23\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">3<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Protecting Privacy<\/td>\n<td style=\"width: 137.727px; text-align: center;\">5\/30\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">4<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Security Engineering<\/td>\n<td style=\"width: 137.727px; text-align: center;\">6\/6\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">5<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Network Security<\/td>\n<td style=\"width: 137.727px; text-align: center;\">6\/13\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">6<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Identity &amp; Access Management<\/td>\n<td style=\"width: 137.727px; text-align: center;\">6\/20\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">7<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Security Assessments<\/td>\n<td style=\"width: 137.727px; text-align: center;\">6\/27\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">8<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Business Continuity and Disaster Recovery Planning<\/td>\n<td style=\"width: 137.727px; text-align: center;\">7\/6\/2017(*)<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">9<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Application Development Security<\/td>\n<td style=\"width: 137.727px; text-align: center;\">7\/11\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">10<\/td>\n<td style=\"width: 430.273px; text-align: center;\">New Trends in Information Security<\/td>\n<td style=\"width: 137.727px; text-align: center;\">7\/18\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">11<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Incident Response<\/td>\n<td style=\"width: 137.727px; text-align: center;\">7\/25\/2017<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 82px; text-align: center;\">12<\/td>\n<td style=\"width: 430.273px; text-align: center;\">Review: Security Threat and Mitigations<\/td>\n<td style=\"width: 137.727px; text-align: center;\">8\/1\/2017<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>(&#8216;*&#8217; indicates a change in class due to holiday)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research, identify, write a summary, post a link to your summary, and be prepared to discuss in class an article you found about a current event in the Information Security arena. An ideal article would be tied thematically to the topic of the week.\u00a0 However, any article you find interesting and would like to share [&hellip;]<\/p>\n","protected":false},"author":14218,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-3122","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages\/3122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/users\/14218"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/comments?post=3122"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages\/3122\/revisions"}],"predecessor-version":[{"id":3153,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages\/3122\/revisions\/3153"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/media?parent=3122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}