• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Learn about MIS
    • Why MIS?
    • What is MIS?
    • Select a program
    • Scholarships
  • Programs
    • Overview
    • Bachelors in MIS
      • STEM Scholarships
    • Minor in MIS
      • Major or Minor?
      • MIS Minor
        • MIS Minor Declaration form
      • Digital Marketing Minor
      • Information Technology Innovation and Entrepreneurship Minor
      • Business Analytics Minor
    • Certificate in MIS
    • MS in IT Auditing & Cyber-Security
    • PhD in MIS
  • Current Students
    • IT Career Fair
    • Awards and scholarships
      • Annual MIS awards
      • Scholarships
      • Information Technology Awards
    • Professional achievement
      • Professional Achievement Program
      • Leaders
      • Earn points
      • Store
    • IBIT mentoring program
    • Independent study
    • Gradebook
    • Temple AIS
  • Alumni
    • Get involved with MIS
    • Register as an alum
    • Donate
  • Technology
    • Overview
    • About this site
      • Course Sites
        • Course Template
      • Doctoral and Master’s Student Sites
      • Faculty and Staff Sites
      • Account and site policy
    • MIS Project Server
  • Research
    • MIS Research
    • Seminars
  • About
    • About MIS
    • Faculty
    • Staff
    • Doctoral students
    • Student e-portfolios
    • Information Technology Advisory Board
    • Contact us and directions

Temple MIS

Connect and innovate with an elite information systems program

Fox School of Business
  • PRO!
  • Leaders
  • Members
  • Groups
  • Store
  • Earn Points
  • Newsletter

Jeta Gjana

Profile picture of Jeta Gjana

@jeta-gjana

Active 5 years, 8 months ago
  • Activity
  • Profile
  • Sites 4
  • Friends 4
  • Groups 0
  • Personal
  • Mentions
  • Favorites
  • Friends
  • Groups
  • Profile picture of Shenika Balfour

    Shenika Balfour and Profile picture of Jeta GjanaJeta Gjana are now friends 5 years, 11 months ago

  • Profile picture of Thomas Forte

    Thomas Forte and Profile picture of Jeta GjanaJeta Gjana are now friends 6 years, 4 months ago

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Become Splunk Certified, on the site Advanced Penetration Testing 6 years, 4 months ago

    Hey guys,

    Some of you might already know this but for those who have not been notified yet, you can attend 4 online courses and become Splunk certified for free 🙂

    Check it out!

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 13: In the news, on the site Advanced Penetration Testing 6 years, 4 months ago

    “Ransomware, hospital hacking present growing cybersecurity threats”

    Hackers crippled computer systems at a major hospital chain, MedStar Health Inc., one of the the largest health care providers in the Bal […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 12 Takeaways, on the site Advanced Penetration Testing 6 years, 4 months ago

    Assigned Reading:

    Aircrack-ng Suite should be used in a  Linux environment and not in a Windows OS since there is not much support for it. For someone who has not been previously exposed to this tool, the […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 11 Takeaways, on the site Advanced Penetration Testing 6 years, 4 months ago

    Assigned Readings:

    The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a set of media access control and physical layer for providing connectivity between wireless technology and wired […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 10 in the news, on the site Advanced Penetration Testing 6 years, 5 months ago

    “Hacker’s Typo Tipped Off Authorities on Billion-Dollar Heist”
    A spelling mistake in an online bank transfer instruction helped prevent a nearly $1 billion heist last month involving the Bangladesh central bank […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 8, on the site Advanced Penetration Testing 6 years, 5 months ago

    Since there’s no assigned readings (according to the syllabus), I thought I would share this interesting article:  “Office puts chips under staff’s skin”.

    Epicenter, a new hi-tech office block in Sweden, are tr […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 7 Takeaways, on the site Advanced Penetration Testing 6 years, 6 months ago

    Assigned readings:

    Burp Suite is a tool that allows security testing of Web applications. This framework is very powerful for if it is used properly, it identifies vulnerabilities and exploits them. This tool […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 5 in the news, on the site Advanced Penetration Testing 6 years, 6 months ago

    “Keybase Releases Encrypted File-Sharin iPhone App”

    Keybase last week announced the alpha release of the Keybase app for the iPhone with a cryptographically secure file mount. Users can write data in an […]

  • Profile picture of Jeta Gjana

    Jeta Gjana posted a new activity comment 6 years, 6 months ago

    Week 4 Takeaways

    CISA
    Every company relies on IT to complete its project. Some of the areas that IT aid the process include development, acquiring, integrating, and maintaining application systems that are critical to the company. The SDLC is the process which every company relies on and it works great if one uses at its best capabilities.…[Read more]

    View Conversation
  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 4 Takeaways, on the site Advanced Penetration Testing 6 years, 6 months ago

    Assigned readings:

    Metasploit extended usage includes various capabilities, such as Mimikatz, a user friendly metepreter script composed of various tasks that attackers will want to perform on the initial […]

  • Profile picture of Jeta Gjana

    Jeta Gjana posted a new activity comment 6 years, 6 months ago

    Week 3 Takeaways

    CISA Review:
    3.5.4 – Risk associated with software development
    There exist various risks with designing and developing a software, ranging from business risk to project risk. Business risk occurs when the new system may not meet the user’s requirements. On the other hand, project risk occurs when the financial budget is lim…[Read more]

    View Conversation
  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 3 Takeaways, on the site Advanced Penetration Testing 6 years, 6 months ago

    Assigned readings:

    Metasploit Unleashed allows various functions, such as the abilities to conduct MSF Post Exploitation,
    Meterpreter Scripting, and Maintaining Access. MSF Post Exploitation allows the user to […]

  • Profile picture of Jeta Gjana

    Jeta Gjana posted a new activity comment 6 years, 7 months ago

    Week 2 Takeaways:

    CISA Review
    · 3.3: Project Management Structure

    There exist many factors why a project is considered a success or worst, a failure. Some of these attributes include a general approach, the detail workflow of documentation, system view, etc. Therefore, there now exist a number of standards and organization who…[Read more]

    View Conversation
  • Profile picture of Jeta Gjana

    Jeta Gjana posted a new activity comment 6 years, 7 months ago

    Week 1 Takeaways

    CISA Review
    · 3.2: Benefits Realization

    This section deals with the major factors of a project, such as cost, quality, delivery date, reliability, and dependability. These factors are further analyzed to see which weaknesses or strengths complete and maintain the system. The function of an IS Auditor is to…[Read more]

    View Conversation
  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 2 Takeaways, on the site Advanced Penetration Testing 6 years, 7 months ago

    Assigned readings:

    The Metasploit Unleashed (MSFU) is an open source penetration tool. This ethical training course also has the objective to provide security awareness for the underprivileged children in East […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 13 Takeaways, on the site Introduction to Ethical Hacking 6 years, 9 months ago

    Reading Summary: Evasion

    Organizations mostly use firewalls and Intrusion Prevention System (IPS) to protect its network infrastructure. IPS is as an evasion technique used to detect any security attacks. […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 12 Takeaways, on the site Introduction to Ethical Hacking 6 years, 9 months ago

    Reading Summary: Web Services

    Web services is a tactic used to improve productivity in terms of increasing the speed and quality of information flow, as well as to make it easier for producers and consumers of […]

  • Profile picture of Jeta Gjana

    Jeta Gjana wrote a new post, Week 11 Takeaways, on the site Introduction to Ethical Hacking 6 years, 9 months ago

    Reading Summary: SQL Injection

    SQL injection is one of the most common vulnerabilities in web applications and that is why it is very crucial to test for vulnerabilities when one creates a website since it […]

  • Load More
  • Course
  • Department
  • Faculty/Staff portfolio
  • Project
  • Student portfolio

Primary Sidebar

COMMUNITY ACTIVITY

Profile Photo
Ben Sadel
profile was updated
Profile Photo
Bryan Huang
profile was updated
Profile Photo
Bryan Huang
submitted their e-portfolio for approval
Profile Photo
Konstantin Bauman
wrote a new post, Welcome to MIS2402, on the site Data and Analytics
Profile Photo
Leila Hosseini
wrote a new post, Welcome to MIS2502, on the site Data and Analytics
Profile Photo
Kennedy Riley
received 400 points for full-time MIS internship
Profile Photo
Kennedy Riley
just received the Apprentice badge
Profile Photo
Ting Mariani
received 100 points for short-term full-time MIS internship
Profile Photo
Ting Mariani
just received the Candidate badge
Profile Photo
Andrew Byun
received 400 points for full-time MIS internship
Profile Photo
Andrew Byun
just received the Apprentice badge
Profile Photo
Ting Mariani
received 100 points for accepting and reporting a full-time job offer
Profile Photo
Rahman Mohammed
just received the Candidate badge
Profile Photo
Rahman Mohammed
received 400 points for full-time MIS internship
1 2 3 … 16 »

COURSES – FALL 2022

Footer

MANAGEMENT INFORMATION SYSTEMS

Fox School of Business
Temple University
210 Speakman Hall
1810 N. 13th Street
Philadelphia, PA 19122

ABOUT MIS

  • About
  • Why MIS?
  • Programs
  • Faculty
  • Staff
  • Give to MIS

MIS COMMUNITY

  • Members
  • Recent Activity
  • Sites
  • Groups

CURRENT STUDENTS

  • PRO
  • PRO Points
  • Leaders
  • Gradebook

CONNECT

RSSTwitterFacebookLinkedinFlickr

Copyright © 2022 Department of Management Information Systems · Fox School of Business · Temple University