• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Schedule Summary
    • First Half of the Semester
      • Week 1: Overview
      • Week 2: Hypervisors
      • Week 3: Windows Scripting and Limiting Access
      • Week 4: Windows Configuration Management
      • Week 5: Windows Patching
      • Week 6: Windows Antivirus and Sniffers
      • Week 7: Windows Firewalls
      • Week 8: Spring Break
    • Second Half of the Semester
      • Week 9: Windows Logging
      • Week 10: Unix/Linux Basics
      • Week 11: Unix/Linux Configuration Management
      • Week 12: Unix/Linux Patching
      • Week 13: Unix/Linux Sniffers
      • Week 14: Unix/Linux Network Controls
      • Week 15: Review
  • Assignments
    • Assignment 1
    • Assignment 2
    • Assignment 3
    • Assignment 4
  • Webex
  • Class Recordings
  • Gradebook

MIS 5170-18 Topic: Operating Systems Security

MIS 5170 - Section 001 - Andrew Szajlai

Fox School of Business

Team Creation

February 6, 2018 by Andrew Szajlai 1 Comment

Good afternoon,

 

I have sent out the current teams as well as those that are not part of a team.  I’ve created this post for you to form teams, if you want me to just place you on a team please send me an e-mail.  Either way I’ll create and update the Black Board document Friday morning 2/9 with what is here and what I have gotten as e-mail for the final teams for future assignments.

Filed Under: Week 04: Windows Configuration Management Tagged With:

Reader Interactions

Comments

  1. Manogna Alahari says

    February 15, 2018 at 11:51 am

    https://krebsonsecurity.com/2018/02/would-you-have-spotted-this-skimmer/

    Skimming is a form of theft by which credit card or debit card information is stolen/captured by recording by installing a bit of technology, typically at the credit card terminal.
    While more banks are issuing credit and debit cards containing a minute computer chip these days, which is more difficult to forge, not all vendors accept them yet. So, most cards still have magnetic strips attached to the back of the cards. This makes it possible to steal the information from the strips and allows criminals to use the fake cards created by skimming. It is difficult to identify whether a skimming device is installed in the ATM or not because of the miniature size of the device and different places where criminals install.. All the retail outlet should use few protective steps like running a baseline scan of the store, installing skimmer detection devices, inspecting the seal etc

    https://www.conexxus.org/sites/default/files/ATM_Skimming_Detection_and_Deterrence_Guide.pdf

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Week 01: Overview (3)
  • Week 02: Hypervisors (1)
  • Week 03: Windows Scripting and Limiting Access (1)
  • Week 04: Windows Configuration Management (2)
  • Week 05: Windows Patching (1)
  • Week 06: Windows Antivirus and Sniffers (1)
  • Week 07: Windows Firewalls (1)
  • Week 09: Windows Logging (1)
  • Week 10: Unix/Linux Basics (1)
  • Week 11: Unix/Linux Configuration Management (1)
  • Week 12: Unix/Linux Patching (1)
  • Week 13: Unix/Linux Sniffers and Firewalls (1)
  • Week 14: Unix/Linux Network Controls (1)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in