<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Temple MIS | Darin Bartholomew | Activity</title>
	<link>https://community.mis.temple.edu/members/darin-bartholomew/activity/</link>
	<atom:link href="https://community.mis.temple.edu/members/darin-bartholomew/activity/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for Darin Bartholomew.</description>
	<lastBuildDate>Fri, 10 Apr 2026 23:17:42 -0400</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">7789d3a22c2e813edc0f13137d3566d0</guid>
				<title>Darin Bartholomew&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/254238/</link>
				<pubDate>Wed, 16 Aug 2023 19:54:06 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">0f1335c54e8896abbe74eb38acf6464c</guid>
				<title>Darin Bartholomew changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/254237/</link>
				<pubDate>Wed, 16 Aug 2023 18:49:11 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7ae1dea9478cfa37f719554e4b57fc5e</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=3271</link>
				<pubDate>Wed, 12 Apr 2017 15:03:58 -0400</pubDate>

									<content:encoded><![CDATA[<p>I thought this was an interesting article about credit card skimmers. It goes in depth and shows picture examples of credit card skimming techniques and how to best protect yourself.</p>
<p>For starters, it&#8217;s a good [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">907a0a01b41744d1f2e65c91a4ccb097</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/mis520817/2017/03/31/whats-wrong-with-americas-current-approach-to-cybersecurity/comment-page-1/#comment-283</link>
				<pubDate>Fri, 31 Mar 2017 13:03:50 -0400</pubDate>

									<content:encoded><![CDATA[<p>I had a brief stint in political communications, so whenever cyber merges with politics, it&#8217;s something I enjoy looking into. I think a big missed opportunity is the ability to use our wealth of technical resources in the private sector to strengthen our government cyber opportunities. I think a driving force behind this is the public mistrust of&hellip;<span class="activity-read-more" id="activity-read-more-168149"><a href="https://community.mis.temple.edu/mis520817/2017/03/31/whats-wrong-with-americas-current-approach-to-cybersecurity/comment-page-1/#comment-283" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/david-eves/" rel="nofollow ugc">David Eves</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis520817" rel="nofollow ugc">MIS5208 Spring 2017</a> Thought this was a pretty good article on the culture of cyber security in America. I know we have talked about this before, but this particular piece [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">4aac866bf7ded2eb123cd9ae675a500d</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=3173</link>
				<pubDate>Thu, 30 Mar 2017 13:48:26 -0400</pubDate>

									<content:encoded><![CDATA[<p>Pretty interesting research by the Digital Citizens Alliance showing the massive scope of stolen credentials in the higher education industry posted on the dark web. I found this to be pretty remarkable because [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">babcf567e3f55ae18a3aa4c96710e418</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=3092</link>
				<pubDate>Mon, 20 Mar 2017 15:24:09 -0400</pubDate>

									<content:encoded><![CDATA[<p>I thought this Wall Street Journal article was pretty good. It discusses using webcameras as a means to attack other larger targets. This is basically the same as what happened when Dyn was hit with a DOS attack [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">8974f5fecf69731706021bd72f7df5f9</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=2998</link>
				<pubDate>Tue, 28 Feb 2017 15:30:51 -0500</pubDate>

									<content:encoded><![CDATA[<p>I thought this was a good read, especially for the cyber track. It has some really good themes within it. The author outlines 4 suggestions for rising through the ranks in the cyber security field.</p>
<p>Progressive [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ee68499a087d47551aed2b7a113033b4</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=2897</link>
				<pubDate>Tue, 21 Feb 2017 14:08:48 -0500</pubDate>

									<content:encoded><![CDATA[<p>I thought this was a good read and relates to our investigations of fraud in a way that we haven’t really covered yet. What if you find fraud but the evidence left behind was tampered with to give the appearance o [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">8016d02c4b32a17ef05572511e56199a</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/mis520817/2017/02/16/essential-skills-every-big-data-analyst-should-have/comment-page-1/#comment-87</link>
				<pubDate>Fri, 17 Feb 2017 16:08:14 -0500</pubDate>

									<content:encoded><![CDATA[<p>I really liked this post. I think often times knowing the audience is something that gets overlooked, especially at the entry level. You might want to impress a board room with how smart you are with the data, but if it goes over everyone&#8217;s head, you do more harm than good for yourself and the company.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/khawlah-abdulaziz-alswailem/" rel="nofollow ugc">Khawlah Abdulaziz Alswailem</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis520817" rel="nofollow ugc">MIS5208 Spring 2017</a>  

Essential Skills Every Data Analyst Should Have
While I&#8217;m working on ACL and practicing dealing with data and finding patterns, I [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">37f87a7baf083b09026cfb5932f71067</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=2815</link>
				<pubDate>Fri, 17 Feb 2017 13:49:56 -0500</pubDate>

									<content:encoded><![CDATA[<p>I thought this was an incredibly relevant post/article about many high level themes of this course. This is an article about threat intelligence and how to use it to actually make you more secure.</p>
<p>The first [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>3</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">bc5fa14f9f0b41413425d2b6263edb7a</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-3-question/#comment-249</link>
				<pubDate>Mon, 13 Feb 2017 13:20:50 -0500</pubDate>

									<content:encoded><![CDATA[<p>Andres, I like how you broke this question down into 3 definitions first. That&#8217;s a good approach to the question and it seems sort of in line with the approach of someone responding to an incident. Breaking down all the pieces of information before coming up with a full solution. I like it!</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> Explain where you think ethics plays a role in how we deal with digital forensics.			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">c754f6f3f1d3024f04ce6fed8fa2375c</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-3-question/#comment-248</link>
				<pubDate>Mon, 13 Feb 2017 13:19:08 -0500</pubDate>

									<content:encoded><![CDATA[<p>Ruslan, as always, great stuff. I liked your mention of social media. It&#8217;s something that I didn&#8217;t even think of. I would take it a step further and say that as investigators we need our own set of rules involving social media. Someone investigating a case can&#8217;t go home and post &#8220;I can&#8217;t believe what ______ did on their work computer!&#8221; and then&hellip;<span class="activity-read-more" id="activity-read-more-165152"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-3-question/#comment-248" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> Explain where you think ethics plays a role in how we deal with digital forensics.			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f66814181ec5616eef97cd8c3b26ef16</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/mis520817/2017/02/10/presentation-on-proper-it-governance/comment-page-1/#comment-55</link>
				<pubDate>Fri, 10 Feb 2017 20:39:57 -0500</pubDate>

									<content:encoded><![CDATA[<p>Fred, great post and best of luck in the presentation.</p>
<p>I like the &#8220;set a goal&#8221; step. I think sometimes we get lost in the incredibly high level &#8220;be secure&#8221; goal and we forget to make goals a little more tangible and measurable to rate performance.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/fred-zajac/" rel="nofollow ugc">Fred Zajac</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis520817" rel="nofollow ugc">MIS5208 Spring 2017</a> On March 2nd, I will be speaking at the Delaware Apartment Association&#8217;s annual conference at Dover Downs.  My part of the presentation will be an hour [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">b9b2b3df18ae77cbc31ae653eea88233</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/mis520817/2017/02/10/target-cio-transforms-retailer-with-in-house-talent-agile/comment-page-1/#comment-54</link>
				<pubDate>Fri, 10 Feb 2017 20:32:03 -0500</pubDate>

									<content:encoded><![CDATA[<p>Blake, I think this outlines a real challenge that companies will have, especially startups. How do you grow at a rapid rate to please business stakeholders but make sure that while increasing the scale of the company you remain secure and implement sound policies to prevent fraud? Like you said, Target has a lot of projects and a lot of resources&hellip;<span class="activity-read-more" id="activity-read-more-164991"><a href="https://community.mis.temple.edu/mis520817/2017/02/10/target-cio-transforms-retailer-with-in-house-talent-agile/comment-page-1/#comment-54" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/blake-d-koen/" rel="nofollow ugc">Blake D. Koen</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis520817" rel="nofollow ugc">MIS5208 Spring 2017</a> 
 

While I was reading this article, all I could think about was how this could lead to an opportunity for giant mistakes to be made. At one point, [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d671f81840b3dde7aaddeccc84157817</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-3-question/#comment-209</link>
				<pubDate>Thu, 09 Feb 2017 14:29:00 -0500</pubDate>

									<content:encoded><![CDATA[<p>I think ethics plays a role in digital forensics because as investigators it&#8217;s our job to tell what we can prove to be the true story as it happened with a piece of computer technology. In some cases we might be the only ones who truly understand the evidence and the artifacts which puts us in a position of incredible influence. We can not allow&hellip;<span class="activity-read-more" id="activity-read-more-164895"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-3-question/#comment-209" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> Explain where you think ethics plays a role in how we deal with digital forensics.			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">98d113461d6ed4eb6a3c4742f99777fb</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-208</link>
				<pubDate>Mon, 06 Feb 2017 15:21:33 -0500</pubDate>

									<content:encoded><![CDATA[<p>Great post Samantha. I think one of the most telling things about this was that 30% of businesses survey either aren&#8217;t in compliance or are unsure of the compliance with PCI standards. That&#8217;s incredibly scary.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">c583df9a25967cfbb1b449f0e8316708</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-207</link>
				<pubDate>Mon, 06 Feb 2017 15:07:13 -0500</pubDate>

									<content:encoded><![CDATA[<p>This is great, Andres. One more example of how important it is to block ports that aren&#8217;t being used or aren&#8217;t necessary. It looks like the port in question is only used for administrative purposes and could probably be closed without any major impact on end user functionality.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">9daebc9a0a5a0995d8b3dbc818de18b8</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-206</link>
				<pubDate>Mon, 06 Feb 2017 15:01:26 -0500</pubDate>

									<content:encoded><![CDATA[<p>Great post Jonathan. Generally the rule of thumb I&#8217;ve operated under is that if I don&#8217;t want to see it on the front page of Philly.com I shouldn&#8217;t hit send in the first place. I wonder if we will ever go back to physical paper communication for incredibly sensitive communication without an urgency of delivery time. We as professionals entering the&hellip;<span class="activity-read-more" id="activity-read-more-164449"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-206" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">c9d73aaf3afa64ce5729e4fd42ec8cdb</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-205</link>
				<pubDate>Mon, 06 Feb 2017 14:57:11 -0500</pubDate>

									<content:encoded><![CDATA[<p>Roberto I thought this was a great article and a fun take on cyber security. I thought the most important one to remember is that it&#8217;s a people game. At the root of every cyber attack or vulnerability is a human element. A computer doesn&#8217;t decide to do evil things, a person tells it to act that way. A system is vulnerable because a person can find&hellip;<span class="activity-read-more" id="activity-read-more-164447"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-205" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e9536e47b215d22a3f43d3e38b0e2de0</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-202</link>
				<pubDate>Mon, 06 Feb 2017 14:13:33 -0500</pubDate>

									<content:encoded><![CDATA[<p>Joseph great comment. I wonder if this is something that Temple is starting to do on select PCs. I&#8217;ve noticed that Windows 10 machines in Alter common areas always give me the &#8220;setting up this PC&#8221; prompt as soon as I log in. </p>
<p>If they&#8217;re giving a fresh image on every reboot what sort of challenges would a forensics expert face if they need to&hellip;<span class="activity-read-more" id="activity-read-more-164440"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-202" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">0e0b8d222bc56732499242cbe5fa3c79</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-170</link>
				<pubDate>Sun, 05 Feb 2017 18:39:14 -0500</pubDate>

									<content:encoded><![CDATA[<p>I think this highlights a massive issue that we&#8217;re going to have to face as a connected world and on a smaller level we need to figure this out as a county. Much like our lack of charter among countries, we also have a maze of different laws and regulations from state to state in the United States which complicates things. It&#8217;s going to start to&hellip;<span class="activity-read-more" id="activity-read-more-164328"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-170" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">731859bb7535d9fdc65632fc992b60f4</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=2629</link>
				<pubDate>Thu, 02 Feb 2017 15:25:49 -0500</pubDate>

									<content:encoded><![CDATA[<p>I thought this was a neat article. It challenges standard risk measurement techniques by claiming that we often fail to account for the actions of people. I agree. I think it is easy to look at and mitigate risks [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b6b0c40a0a51687d6537714c323cd241</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-141</link>
				<pubDate>Tue, 31 Jan 2017 14:32:09 -0500</pubDate>

									<content:encoded><![CDATA[<p>There is a ransomware attack that is encrypting victims machines after tricking them by offering free access to Netflix on the website. In order to rid yourself of the attack you need to pay $100 worth of bitcoin.</p>
<p>I thought this was interesting because usually, at least in my reading, you see a story of ransomware targeting a machine that has&hellip;<span class="activity-read-more" id="activity-read-more-163644"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-2-question/#comment-141" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> This week find an article about cyber security and post it here along with comments about what happened.

 

I&#8217;ll start with the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">282421807c7d1984039ceadba082bbd7</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-1-question/#comment-112</link>
				<pubDate>Sun, 29 Jan 2017 22:46:15 -0500</pubDate>

									<content:encoded><![CDATA[<p>Roberto I like your idea about the leadership chart/chain of command. I think sometimes it&#8217;s easy for us to get lost in the policies and the investigative tools and forget the fact that there are humans behind all of this who need to be communicated with and considered.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> If you were tasked to write the Wikipedia page for Organizational Forensics what would it say?

Post your answer and through out the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">92d00bb9d2dd2da0bdc4ae00b186ffb7</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-1-question/#comment-111</link>
				<pubDate>Sun, 29 Jan 2017 22:44:52 -0500</pubDate>

									<content:encoded><![CDATA[<p>I like the use of the word political.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> If you were tasked to write the Wikipedia page for Organizational Forensics what would it say?

Post your answer and through out the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">957db0e1aab4516c1bb53d306f288b15</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-1-question/#comment-110</link>
				<pubDate>Sun, 29 Jan 2017 22:30:26 -0500</pubDate>

									<content:encoded><![CDATA[<p>Ruslan thanks for mentioning several tools that are helpful with forensics. I&#8217;m hoping we can learn a few of these in class.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> If you were tasked to write the Wikipedia page for Organizational Forensics what would it say?

Post your answer and through out the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">378e11558f62aa4e09f69556aec191d1</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-1-question/#comment-109</link>
				<pubDate>Sun, 29 Jan 2017 22:28:48 -0500</pubDate>

									<content:encoded><![CDATA[<p>Andres, I liked your way of breaking things down. When doing my initial post I ran into a similar feeling that a lot of things can fall under organizational forensics. It sometimes feels like a catch-all umbrella term.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> If you were tasked to write the Wikipedia page for Organizational Forensics what would it say?

Post your answer and through out the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7cb9e5d99c632fd7932c068b1330f88e</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5170sec002sp2017/week-1-question/#comment-88</link>
				<pubDate>Thu, 26 Jan 2017 15:40:02 -0500</pubDate>

									<content:encoded><![CDATA[<p>I’m going to agree with Andres and his high level definition of organizational forensics. I think where organizational and digital forensics differ is that the organizational side is more the policies and procedures that need to be followed and the regulations that the business is placed under. Digital forensics is the evidence gathering to s&hellip;<span class="activity-read-more" id="activity-read-more-163093"><a href="http://community.mis.temple.edu/mis5170sec002sp2017/week-1-question/#comment-88" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/larry-brandolph/" rel="nofollow ugc">Larry Brandolph</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5170sec002sp2017" rel="nofollow ugc">MIS 5170-Topic: Forensics 2017</a> If you were tasked to write the Wikipedia page for Organizational Forensics what would it say?

Post your answer and through out the [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">bd117b1173a9d27dcdf986c99d643530</guid>
				<title>Darin Bartholomew wrote a new post on the site MIS5208 Spring 2017</title>
				<link>http://community.mis.temple.edu/mis520817/?p=2488</link>
				<pubDate>Thu, 26 Jan 2017 14:09:46 -0500</pubDate>

									<content:encoded><![CDATA[<p>Hi everyone! I’m Darin Bartholomew. I’m a part time student in the cyber security track finishing this summer! I’m not new to Temple, I graduated with a BBA in MIS for FOX in 2014 and when I came back here for w [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">96e46784fa15682d3338196710f37aba</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5209fall16/2016/12/11/discussion-week-14/#comment-187</link>
				<pubDate>Mon, 12 Dec 2016 16:19:09 -0500</pubDate>

									<content:encoded><![CDATA[<p>I agree with Shain with regards to question one. I think that when faced with a life threatening situation, a violation of HIPPA could be a risk that is accepted but there are things that can be done to reduce the number of incidents where that would happen, using mitigations like a safe send mentioned by Shain. Without a safe send the &#8220;life or&hellip;<span class="activity-read-more" id="activity-read-more-161141"><a href="https://community.mis.temple.edu/itacs5209fall16/2016/12/11/discussion-week-14/#comment-187" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> D14.1: Discussion Topic 1:
In regards to laws and regulations… Complying with the law is obviously important, but in my industry (healthcare), s [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7f514b31bcefd7c97ac0498e06d5b75f</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5209fall16/2016/11/27/discussion-week-12/#comment-154</link>
				<pubDate>Sun, 27 Nov 2016 18:11:49 -0500</pubDate>

									<content:encoded><![CDATA[<p>Buffer Bloat has to do with congestion of the network. Essentially there&#8217;s a buffer that is used to ensure that packets reach their destination without being dropped. The impact on TCP is that because of the  way handshake, it takes  a little more resources to complete connections and send packets which could lead to more use of resources.. One of&hellip;<span class="activity-read-more" id="activity-read-more-159903"><a href="http://community.mis.temple.edu/itacs5209fall16/2016/11/27/discussion-week-12/#comment-154" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> Discuss one of the following 3 topics:

 	What is buffer bloat, and what does it have to do with TCP?
 	We learn in this unit that TCP has a lot of [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">67b28b21d08c16b4fd3f03780dab85d2</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5209fall16/2016/11/13/discussion-week-11/#comment-138</link>
				<pubDate>Sun, 13 Nov 2016 17:48:19 -0500</pubDate>

									<content:encoded><![CDATA[<p>I support the use of these tools by a very small number of experienced members of the IT team at an organization. This would be contingent on them having very clearly defined engagement policies using these tools to find vulnerabilities and very clear definitions of where any investigation is to stop and how to document findings. </p>
<p>I would&hellip;<span class="activity-read-more" id="activity-read-more-159072"><a href="http://community.mis.temple.edu/itacs5209fall16/2016/11/13/discussion-week-11/#comment-138" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> In this unit, we begin to discuss some security tools, such as password crackers, disassemblers, packet sniffers, etc.  We will discuss many of these [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2e7e9e09e5d1906258b717a12645bb79</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5209fall16/2016/10/30/discussion-week-9/#comment-113</link>
				<pubDate>Mon, 31 Oct 2016 13:24:51 -0400</pubDate>

									<content:encoded><![CDATA[<p>I think the biggest concern is that the business or agency, without any contractual language, has no control over that device. With a completely open “BYOD” policy an employee could bring their tablet running an unpatched Windows 7 and browse an old version of Internet Explorer and store data without any antivirus protection at all.<br />
The best way&hellip;<span class="activity-read-more" id="activity-read-more-157734"><a href="https://community.mis.temple.edu/itacs5209fall16/2016/10/30/discussion-week-9/#comment-113" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> In this unit, we discussed the growing trend of BYOD (Bring your own device) and some of the challenges associated with this.  There has been some talk [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7cb423ec8858bf43964bf97a7a683786</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5209fall16/2016/10/23/discussion-week-8/#comment-108</link>
				<pubDate>Mon, 24 Oct 2016 13:20:07 -0400</pubDate>

									<content:encoded><![CDATA[<p>The answer to this question, I think, lies within the resources of the business. A larger company has the resources to develop plans for something as specific and rare as a pandemic but a smaller organization might broaden the scope to a more generic &#8220;mass loss of life.&#8221;</p>
<p>I think the threat to IT is that in a pandemic situation there could be a&hellip;<span class="activity-read-more" id="activity-read-more-156870"><a href="https://community.mis.temple.edu/itacs5209fall16/2016/10/23/discussion-week-8/#comment-108" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> Take a look at this document from the Centers for Disease Control, which provides a plan for business to prepare for an influenza pandemic: [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d1df5828d630f37dbe7fe2a91da854a7</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5206fall16/2016/10/14/week-8-in-the-news/#comment-1117</link>
				<pubDate>Sun, 16 Oct 2016 22:19:02 -0400</pubDate>

									<content:encoded><![CDATA[<p>The CIA is preparing for a possible cyber attack on Russia <a href="http://townhall.com/tipsheet/mattvespa/2016/10/15/report-cia-could-be-planning-a-cyber-strike-against-russia-n2232760" rel="nofollow ugc">http://townhall.com/tipsheet/mattvespa/2016/10/15/report-cia-could-be-planning-a-cyber-strike-against-russia-n2232760</a></p>
<p>I thought this was interesting because it shows that a method of war will be cyber war. I thought it was interesting that the Vice President said that he hopes that the&hellip;<span class="activity-read-more" id="activity-read-more-155760"><a href="http://community.mis.temple.edu/itacs5206fall16/2016/10/14/week-8-in-the-news/#comment-1117" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/david-lanter/" rel="nofollow ugc">David Lanter</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5206fall16" rel="nofollow ugc">ITACS 5206</a>			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">a883d4ea54f3d4f126d06ccc551e6fc0</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5209fall16/2016/10/09/discussion-week-6/#comment-93</link>
				<pubDate>Tue, 11 Oct 2016 17:26:34 -0400</pubDate>

									<content:encoded><![CDATA[<p>This is over simplified, but I admittedly struggle with the complexity of this. Quantum computing in general brings so much more computing power to the table. It’s the ability to compute mathematical problems and algorithms quicker. This could be used to crack existing cryptography quicker or create more complex algorithms to encrypt data. I a&hellip;<span class="activity-read-more" id="activity-read-more-155012"><a href="https://community.mis.temple.edu/itacs5209fall16/2016/10/09/discussion-week-6/#comment-93" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> Research how quantum computing is being used in both enhancing cryptography, and weakening existing cryptography standards, and discuss these with the cla [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">42d627f4c39c6d1d92af5bb6e92bac74</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5209fall16/2016/09/18/discussion-3/#comment-45</link>
				<pubDate>Wed, 21 Sep 2016 00:05:43 -0400</pubDate>

									<content:encoded><![CDATA[<p>Thank you for your help, Scott</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> Linux or Windows?  Seems like nothing starts a war in the IT department like this topic… but which is better?  Which is more secure?  These two oper [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">099a4b509292eb02c5add600ba449be1</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5209fall16/2016/09/18/discussion-3/#comment-44</link>
				<pubDate>Wed, 21 Sep 2016 00:05:15 -0400</pubDate>

									<content:encoded><![CDATA[<p>I would prefer windows because at the end of the day, you know Microsoft is the responsible party for patching and fixing issues. Depending on your distribution of Linux, that’s a little fuzzier. Since Microsoft and Windows have a larger market share and more money, tons of resources can be spent securing their operating systems compared with L&hellip;<span class="activity-read-more" id="activity-read-more-151762"><a href="https://community.mis.temple.edu/itacs5209fall16/2016/09/18/discussion-3/#comment-44" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5209fall16" rel="nofollow ugc">ITACS 5209</a> Linux or Windows?  Seems like nothing starts a war in the IT department like this topic… but which is better?  Which is more secure?  These two oper [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e4d688a4b693ed7a49982745e11b6717</guid>
				<title>Darin Bartholomew posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5213sec011summer12016/2016/05/04/welcome-to-class/#comment-13</link>
				<pubDate>Sun, 08 May 2016 22:13:09 -0400</pubDate>

									<content:encoded><![CDATA[<p>Hi everyone,</p>
<p>I&#8217;m Darin Bartholomew. I&#8217;m a part time student, working full time at Temple in the banner student competency center where I support the banner system and the Resource 25 scheduling system. I graduated from Temple in 2014 with a MIS degree. I&#8217;m looking forward to the class!</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/deval-shah/" rel="nofollow ugc">Deval Shah</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5213sec011summer12016" rel="nofollow ugc">MIS 5213 Summer 2016</a> Hello All,

Welcome to Intrusion Detection and Response class.  I look forward to getting to meeting all of you next week.  You will be able to find t [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">cead3c481c11b4d4aeac0e8a209d0591</guid>
				<title>Darin Bartholomew wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=241</link>
				<pubDate>Mon, 14 Mar 2016 12:43:46 -0400</pubDate>

									<content:encoded><![CDATA[<p>The Department of Justice is saying that Apple has already complied with similar orders in the past, saying Apple dedicated staff and infrastructure to comply. The DOJ also combated the Apple argument that this [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">45b35c3e7e1d2afad7936539252c46d7</guid>
				<title>Darin Bartholomew wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=107</link>
				<pubDate>Sun, 31 Jan 2016 20:42:34 -0500</pubDate>

									<content:encoded><![CDATA[<p>The reading this week went through a number of additional modules and uses of metasploit. I thought it was fun to read some of the more random ones like the OSX camera exploit that takes a picture from the camera [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">771709389fb0c04cd897534a21dabb00</guid>
				<title>Darin Bartholomew wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=72</link>
				<pubDate>Sun, 24 Jan 2016 15:30:10 -0500</pubDate>

									<content:encoded><![CDATA[<p>The reading for this week was a pretty comprehensive tutorial/manual for metasploit. I thought it was very good and organized rather well. I thought it was nice and simple, didn’t get too into the weeds. It was v [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">41e8956e7c33cea3bfbea88f4e65b847</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=484</link>
				<pubDate>Tue, 17 Nov 2015 00:28:15 -0500</pubDate>

									<content:encoded><![CDATA[<p>Regardless of how many security products and procedures you put in place there will still be ways to get around them and cover the tracks. Evasion techniques are used to accomplish these goals. Our reading is an [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ce9a1fba3ed9a71acc43a7bc77dbbfa9</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=433</link>
				<pubDate>Tue, 10 Nov 2015 01:26:08 -0500</pubDate>

									<content:encoded><![CDATA[<p>Web Services are defined in the reading as “component services that others might use to build bigger service.” An example of this is a service that automatically updates the stock price while you’re reading a Wal [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f5d3e5a0c6d223c4f7afac301f21c225</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=402</link>
				<pubDate>Tue, 03 Nov 2015 00:14:48 -0500</pubDate>

									<content:encoded><![CDATA[<p>SQL injection is a technique where someone uses the URL of a website to inject SQL queries and establish information about the SQL database that the application runs off of. Once the information is gathered it is [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d65ad2b9830da47e38291b5fe0c3bd93</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=380</link>
				<pubDate>Wed, 28 Oct 2015 16:42:31 -0400</pubDate>

									<content:encoded><![CDATA[<p>Burp suite is a powerful tool used to test potential vulnerabilities in web applications. Burp sequencer is used to find authentication to web applications. Burp decoder is used to decode encrypted usernames or [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">4e5f33dbe850fd782cffce72adef7775</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=310</link>
				<pubDate>Sun, 18 Oct 2015 20:14:21 -0400</pubDate>

									<content:encoded><![CDATA[<p>Malware is like an umbrella term used for all malicious software to fall under. Viruses, Trojans, worms, etc all fall under the umbrella of Malware. The Sans Six incident handling model was suggested by the [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">6f46cc3357846d6c3ae74b37c2e888e8</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=303</link>
				<pubDate>Wed, 14 Oct 2015 16:12:23 -0400</pubDate>

									<content:encoded><![CDATA[<p>Social engineering is an often overlooked form of security threat for an organization. In some cases you could probably argue that social engineering might be the easiest way to launch an attack on an [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">0a83383ebfdce6dcfdc29cee60945c50</guid>
				<title>Darin Bartholomew wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=260</link>
				<pubDate>Tue, 06 Oct 2015 01:28:27 -0400</pubDate>

									<content:encoded><![CDATA[<p>Net cat is just another tool used to test machines and networks with the main difference over nmap being the ability to read as well as write. Net cat is important to know because it is widely regarded as one of [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">c2dd115289c6c010e98cb23dc8b92d9b</guid>
				<title>Darin Bartholomew&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/130592/</link>
				<pubDate>Thu, 01 Oct 2015 14:25:13 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
		
	</channel>
</rss>