<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Temple MIS | Laurel Miller | Friends Activity</title>
	<link>https://community.mis.temple.edu/members/laurel-miller/activity/friends/</link>
	<atom:link href="https://community.mis.temple.edu/members/laurel-miller/activity/friends/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for Laurel Miller&#039;s friends.</description>
	<lastBuildDate>Thu, 23 Apr 2026 13:07:49 -0400</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">8038fc3037316f4a1f546bb6bc63d723</guid>
				<title>Sunil Wattal&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/274213/</link>
				<pubDate>Fri, 06 Mar 2026 20:52:06 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fd7c1c74d6abe8ef746db818983ad220</guid>
				<title>Sunil Wattal&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/249022/</link>
				<pubDate>Wed, 18 Jan 2023 03:40:02 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a65f9caae6b45276eeb277940cf3355f</guid>
				<title>Sunil Wattal&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/235289/</link>
				<pubDate>Sat, 25 Sep 2021 14:19:47 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">748509c2bdf54ff64f2aebadb84d6d47</guid>
				<title>Sunil Wattal&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/184861/</link>
				<pubDate>Fri, 23 Feb 2018 05:47:42 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">e4765634f71528078cf62c0d5ec15680</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=210</link>
				<pubDate>Thu, 22 Feb 2018 21:17:34 -0500</pubDate>

									<content:encoded><![CDATA[<p>IEEE Transactions on Software Engineering, 33(8), August 2007, pp. 544 &#8211; 557</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">0e89912844f9b7d6bd954b5163879280</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=204</link>
				<pubDate>Thu, 22 Feb 2018 21:06:26 -0500</pubDate>

									<content:encoded><![CDATA[<p>Journal of Management Information Systems, 26(2), Fall 2009, pp. 69 &#8211; 95</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d12437b2e96873417e9c041307ef112b</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=200</link>
				<pubDate>Thu, 22 Feb 2018 21:01:33 -0500</pubDate>

									<content:encoded><![CDATA[<p>Information Systems Research, 24(3), 2013: pp 679-697</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">bb5f91ac8e31455066f1ef12bdb83d16</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=190</link>
				<pubDate>Thu, 22 Feb 2018 20:38:51 -0500</pubDate>

									<content:encoded><![CDATA[<p>MIS Quarterly, 38(3), 2014: pp 773-794</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">1ad439bf3a292704609c2231b5f9324a</guid>
				<title>Sunil Wattal&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/184741/</link>
				<pubDate>Thu, 22 Feb 2018 20:25:26 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">523a9c5862250baca8fe13e7bf29218b</guid>
				<title>Sunil Wattal changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/184726/</link>
				<pubDate>Thu, 22 Feb 2018 19:28:33 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">866fe01ddc5fd8217ef6eddb2f657c53</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=213</link>
				<pubDate>Wed, 21 Feb 2018 19:01:54 -0500</pubDate>

									<content:encoded><![CDATA[<p>Journal of Management Information Systems, 27(1), Summer 2010, pp. 145 &#8211; 174</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">e38ccdd8393e0106c3e27f117bd66421</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=165</link>
				<pubDate>Fri, 16 Feb 2018 23:15:15 -0500</pubDate>

									<content:encoded><![CDATA[<p>Management Science 61.5, 2015: 949-962.</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">312b45871d49b07c9ce9c383d951f14b</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=163</link>
				<pubDate>Fri, 16 Feb 2018 23:14:16 -0500</pubDate>

									<content:encoded><![CDATA[<p>MIS Quarterly 41.1 (2017): 163-187.</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f7e05d090442191c27f20c9cefd12f3f</guid>
				<title>Sunil Wattal wrote a new post on the site Sunil Wattal</title>
				<link>http://community.mis.temple.edu/swattal/?p=161</link>
				<pubDate>Fri, 16 Feb 2018 23:12:21 -0500</pubDate>

									<content:encoded><![CDATA[<p>Information Systems Research 27.3, 2016: 478-496.</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">13b9b95b6db7a7dd83e75f8e6c3a8df9</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=378</link>
				<pubDate>Mon, 04 Apr 2016 15:29:59 -0400</pubDate>

									<content:encoded><![CDATA[<p>Hey guys,</p>
<p>Some of you might already know this but for those who have not been notified yet, you can attend 4 online courses and become Splunk certified for free 🙂</p>
<p>Check it out!</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">88f093f605c58d2e1da1bbc267a4b800</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=369</link>
				<pubDate>Sat, 02 Apr 2016 22:14:37 -0400</pubDate>

									<content:encoded><![CDATA[<p>“Ransomware, hospital hacking present growing cybersecurity threats”</p>
<p>Hackers crippled computer systems at a major hospital chain, MedStar Health Inc., one of the the largest health care providers in the Bal [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">09752cb5b580d21d1f9fae31e3560747</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=337</link>
				<pubDate>Sat, 26 Mar 2016 17:21:45 -0400</pubDate>

									<content:encoded><![CDATA[<p>Assigned Reading:</p>
<p>Aircrack-ng Suite should be used in a  Linux environment and not in a Windows OS since there is not much support for it. For someone who has not been previously exposed to this tool, the [&hellip;] <img loading="lazy" src="https://community.mis.temple.edu/mis5212sec001s16/files/2016/03/chinese-hacking-300x148.jpg" /></p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">bd9909999438f3fc22d436ed8d73e2fe</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=282</link>
				<pubDate>Mon, 21 Mar 2016 02:11:19 -0400</pubDate>

									<content:encoded><![CDATA[<p>Assigned Readings:</p>
<p>The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a set of media access control and physical layer for providing connectivity between wireless technology and wired [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">29b08c033ee61a9fccf9232ab08112a5</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=234</link>
				<pubDate>Sat, 12 Mar 2016 14:53:55 -0500</pubDate>

									<content:encoded><![CDATA[<p>“Hacker’s Typo Tipped Off Authorities on Billion-Dollar Heist”<br />
A spelling mistake in an online bank transfer instruction helped prevent a nearly $1 billion heist last month involving the Bangladesh central bank [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">12a02b662533e881564ba34f01966cd7</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=200</link>
				<pubDate>Mon, 07 Mar 2016 00:48:55 -0500</pubDate>

									<content:encoded><![CDATA[<p>Since there&#8217;s no assigned readings (according to the syllabus), I thought I would share this interesting article:  “Office puts chips under staff’s skin”.</p>
<p>Epicenter, a new hi-tech office block in Sweden, are tr [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">de63ed7cadcedbb424cd732d9ef2a391</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=163</link>
				<pubDate>Mon, 15 Feb 2016 15:50:02 -0500</pubDate>

									<content:encoded><![CDATA[<p>Assigned readings:</p>
<p>Burp Suite is a tool that allows security testing of Web applications. This framework is very powerful for if it is used properly, it identifies vulnerabilities and exploits them. This tool [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">1ec0be1267555d3ba6adf388bc9808f1</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=156</link>
				<pubDate>Mon, 08 Feb 2016 23:17:36 -0500</pubDate>

									<content:encoded><![CDATA[<p>&#8220;Keybase Releases Encrypted File-Sharin iPhone App&#8221;</p>
<p>Keybase last week announced the alpha release of the Keybase app for the iPhone with a cryptographically secure file mount. Users can write data in an [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">4e6b4ff6c2a9ccc7da65fbdbb986091a</guid>
				<title>Jeta Gjana posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5203spring2016/2016/01/28/reading-week-4-923/#comment-111</link>
				<pubDate>Mon, 01 Feb 2016 01:30:19 -0500</pubDate>

									<content:encoded><![CDATA[<p>Week 4 Takeaways</p>
<p>CISA<br />
Every company relies on IT to complete its project. Some of the areas that IT aid the process include development, acquiring, integrating, and maintaining application systems that are critical to the company. The SDLC is the process which every company relies on and it works great if one uses at its best capabilities.&hellip;<span class="activity-read-more" id="activity-read-more-138632"><a href="http://community.mis.temple.edu/mis5203spring2016/2016/01/28/reading-week-4-923/#comment-111" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/vasant-kumar/" rel="nofollow ugc">Vasant Kumar</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5203spring2016" rel="nofollow ugc">System &amp; Infrastructure Lifecycle Management 1</a> Topics

Understanding SDLC phases related to project management

 

Traditional SDLC Phases

 

Requirement P [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">56154bc93ff8c034cc14f7eb70d32fc4</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=109</link>
				<pubDate>Sun, 31 Jan 2016 22:35:33 -0500</pubDate>

									<content:encoded><![CDATA[<p>Assigned readings:</p>
<p>Metasploit extended usage includes various capabilities, such as Mimikatz, a user friendly metepreter script composed of various tasks that attackers will want to perform on the initial [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">da882c57e21d67d66cabe9eb7c26b0b6</guid>
				<title>Jeta Gjana posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5203spring2016/2016/01/21/reading-week-3-916/#comment-90</link>
				<pubDate>Sat, 23 Jan 2016 18:32:30 -0500</pubDate>

									<content:encoded><![CDATA[<p>Week 3 Takeaways</p>
<p>CISA Review:<br />
3.5.4 – Risk associated with software development<br />
There exist various risks with designing and developing a software, ranging from business risk to project risk. Business risk occurs when the new system may not meet the user’s requirements. On the other hand, project risk occurs when the financial budget is lim&hellip;<span class="activity-read-more" id="activity-read-more-137402"><a href="http://community.mis.temple.edu/mis5203spring2016/2016/01/21/reading-week-3-916/#comment-90" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/vasant-kumar/" rel="nofollow ugc">Vasant Kumar</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5203spring2016" rel="nofollow ugc">System &amp; Infrastructure Lifecycle Management 1</a> Topics

Project control frameworks, practices and tools contd.

 

Project success factors and risk

 

Project r [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">25f420754d561f868e25dc99abcc48b6</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=69</link>
				<pubDate>Sat, 23 Jan 2016 17:31:01 -0500</pubDate>

									<content:encoded><![CDATA[<p>Assigned readings:</p>
<p>Metasploit Unleashed allows various functions, such as the abilities to conduct MSF Post Exploitation,<br />
Meterpreter Scripting, and Maintaining Access. MSF Post Exploitation allows the user to [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">c03ad80bc8c88855c82375b98b635126</guid>
				<title>Jeta Gjana posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5203spring2016/2016/01/15/reading-week-2-99/#comment-69</link>
				<pubDate>Mon, 18 Jan 2016 23:17:01 -0500</pubDate>

									<content:encoded><![CDATA[<p>Week 2 Takeaways:</p>
<p>CISA Review<br />
·         3.3: Project Management Structure</p>
<p>There exist many factors why a project is considered a success or worst, a failure. Some of these attributes include a general approach, the detail workflow of documentation, system view, etc. Therefore, there now exist a number of standards and organization who&hellip;<span class="activity-read-more" id="activity-read-more-136773"><a href="http://community.mis.temple.edu/mis5203spring2016/2016/01/15/reading-week-2-99/#comment-69" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/vasant-kumar/" rel="nofollow ugc">Vasant Kumar</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5203spring2016" rel="nofollow ugc">System &amp; Infrastructure Lifecycle Management 1</a> Topics

Business Case / Feasibility contd.

Project and portfolio management techniques

Project governance [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">4d25badb9de93ec888dbff08b8d0057d</guid>
				<title>Jeta Gjana posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5203spring2016/2016/01/08/reading-materials-826/#comment-68</link>
				<pubDate>Mon, 18 Jan 2016 23:11:42 -0500</pubDate>

									<content:encoded><![CDATA[<p>Week 1 Takeaways</p>
<p>CISA Review<br />
·         3.2: Benefits Realization</p>
<p>This section deals with the major factors of a project, such as cost, quality, delivery date, reliability, and dependability. These factors are further analyzed to see which weaknesses or strengths complete and maintain the system. The function of an IS Auditor is to&hellip;<span class="activity-read-more" id="activity-read-more-136772"><a href="http://community.mis.temple.edu/mis5203spring2016/2016/01/08/reading-materials-826/#comment-68" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/vasant-kumar/" rel="nofollow ugc">Vasant Kumar</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5203spring2016" rel="nofollow ugc">System &amp; Infrastructure Lifecycle Management 1</a> Topics:

Introduction to  the course, syllabus,  quiz, assignments, grading

Benefits realization techniques (total c [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">33b122af4c9b7bfdd095bc37277d1ff5</guid>
				<title>Jeta Gjana wrote a new post on the site Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001s16/?p=48</link>
				<pubDate>Mon, 18 Jan 2016 15:57:36 -0500</pubDate>

									<content:encoded><![CDATA[<p>Assigned readings:</p>
<p>The Metasploit Unleashed (MSFU) is an open source penetration tool. This ethical training course also has the objective to provide security awareness for the underprivileged children in East [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">3930a6f132b71e653b28bece4531db46</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=472</link>
				<pubDate>Sat, 14 Nov 2015 16:02:06 -0500</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: Evasion</p>
<p>Organizations mostly use firewalls and Intrusion Prevention System (IPS) to protect its network infrastructure. IPS is as an evasion technique used to detect any security attacks. [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">39896607258ba3d8ebc361e9abf09834</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=435</link>
				<pubDate>Tue, 10 Nov 2015 13:33:33 -0500</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: Web Services</p>
<p>Web services is a tactic used to improve productivity in terms of increasing the speed and quality of information flow, as well as to make it easier for producers and consumers of [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">41a162e05918a88a8e4de2167e524674</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=392</link>
				<pubDate>Mon, 02 Nov 2015 12:59:21 -0500</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: SQL Injection</p>
<p>SQL injection is one of the most common vulnerabilities in web applications and that is why it is very crucial to test for vulnerabilities when one creates a website since it [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7990ea40f71d351bc22ff2c4545810d1</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=346</link>
				<pubDate>Mon, 26 Oct 2015 01:08:13 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: Web Application Hacking</p>
<p>Web application hacking is very common through client-submission of unexpected inputs. Knowing how to leverage such vulnerabilities is very important and yet challenging [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9a1c2b048746fdef427dda975efab756</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=308</link>
				<pubDate>Sun, 18 Oct 2015 14:11:23 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: Malware</p>
<p>Malware infection is becoming very popular nowadays, ranging from Trojans, Backdoors, Zero-Days, Virus, Worms, and Polymorphic malware. Each organization has its way of handling such an [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">4ec4f7a6b4939062a7c080e9ffb9f8cb</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=282</link>
				<pubDate>Sat, 10 Oct 2015 23:28:45 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: Social Engineering</p>
<p>Social Engineering has become a powerful hacker technique that most organizations still ignore, if not, underestimate its true impact. This technique takes into advantage the [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">80a5f5623dc897d1ec10b6aba303a1ca</guid>
				<title>Jeta Gjana&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/130811/</link>
				<pubDate>Sun, 04 Oct 2015 22:30:10 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">6c15bb4f564ba387a177ae249c5a449a</guid>
				<title>Jeta Gjana changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/130810/</link>
				<pubDate>Sun, 04 Oct 2015 22:28:56 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">eef87633868fde23b8d3ecd58c43deb6</guid>
				<title>Jeta Gjana changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/130809/</link>
				<pubDate>Sun, 04 Oct 2015 22:28:16 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b8f87a416d30282be3500f02016e31a7</guid>
				<title>Jeta Gjana changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/130807/</link>
				<pubDate>Sun, 04 Oct 2015 22:26:39 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">036e9e2cea62f9ddb1b0578bf70618ad</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=240</link>
				<pubDate>Fri, 02 Oct 2015 18:15:39 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: NetCat</p>
<p>NetCat is a tool built by Hobbit and made available in a Windows platform by Weld Pond.  It is recommended to test the firewall and router configurations in a test environment and not [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">900710cccf8a31a274588662719d96f6</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=208</link>
				<pubDate>Mon, 28 Sep 2015 22:35:09 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary:</p>
<p>Packet sniffing can exists in a switched or non-switched environment. Packet sniffing usually arises from an internal threat and it is shares the same concept as the man-in-the-middle attack [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f3d2b420a572736d4bca1df1780676dc</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=153</link>
				<pubDate>Sun, 20 Sep 2015 14:24:31 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary: Enumeration and Footprinting</p>
<p>The Enumeration process identifies valid user accounts or any weak component/resource. Some of the key areas of information include user and groups, network [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ad91463707295c5e9ffa590e1e04dc95</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=115</link>
				<pubDate>Sat, 12 Sep 2015 12:46:13 -0400</pubDate>

									<content:encoded><![CDATA[<p>Reading Summary:</p>
<p>The enterprise often contains firewalls and an intrusion detection system (IDS) to keep the organization secure. However, that is not enough to detect vulnerabilities or web attacks on an [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">1bbaa3bf4375dd8032ba60f086eeb90b</guid>
				<title>Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001f15/?p=89</link>
				<pubDate>Tue, 08 Sep 2015 23:31:22 -0400</pubDate>

									<content:encoded><![CDATA[<p>Week 3 Reading Summary Takeaways:</p>
<p>In the world of hacking, attackers start with reconnaissance process which has the objective to collect intelligence about the target. This is often accomplished through port [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">6942eb308b5e287e49b9db0a07617d73</guid>
				<title>Sunil Wattal wrote a new post on the site MIS Department Intranet</title>
				<link>http://community.mis.temple.edu/intranet/?p=367</link>
				<pubDate>Tue, 30 Jun 2015 17:49:28 -0400</pubDate>

									<content:encoded><![CDATA[<p>Travel policy for MIS PhD students</p>
<p>All MIS doctoral students are eligible to apply for up to $500 / year in travel funds. Doctoral student travel is managed by the departmental PhD coordinator. The research [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">8fe257de5fff0ff5d1fca9c65f3393e8</guid>
				<title>Jeta Gjana posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5214s2015/2015/02/16/syllabus-updated/#comment-35</link>
				<pubDate>Mon, 16 Feb 2015 22:12:52 -0500</pubDate>

									<content:encoded><![CDATA[<p>Good Afternoon Class,</p>
<p>I still do not have a team member; if you don&#8217;t either and would like to work together, please email me at <a href="mailto:jeta.gjana@temple.edu" rel="nofollow ugc">jeta.gjana@temple.edu</a></p>
<p>Thank you.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/gregory-s-senko/" rel="nofollow ugc">Gregory S. Senko</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5214s2015" rel="nofollow ugc">MIS5214 &#8211; Security Architecture</a> I have posted the &#8220;enhanced&#8221; version of the syllabus. It specifies that 2 people can form a team for the semester project.

I&#8217;d rather [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">91bc4d0d48c6c1e379d3d335a20e6a72</guid>
				<title>Jeta Gjana posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5214s2015/2015/02/14/week-6-assignment-n-tier-web-architecture/#comment-33</link>
				<pubDate>Mon, 16 Feb 2015 16:47:56 -0500</pubDate>

									<content:encoded><![CDATA[<p>Hello class,</p>
<p>Just wanted to share today&#8217;s highlight on international hackers stealing $1 billion from more than 100 banks in 30 countries, such as Russia, U.S. and China. 1 This goes along with the topic for this week and perhaps banks should adapt a secure n-tier architecture to secure their transactions and mitigate the risk of being hacked&hellip;<span class="activity-read-more" id="activity-read-more-113009"><a href="http://community.mis.temple.edu/mis5214s2015/2015/02/14/week-6-assignment-n-tier-web-architecture/#comment-33" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/gregory-s-senko/" rel="nofollow ugc">Gregory S. Senko</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5214s2015" rel="nofollow ugc">MIS5214 &#8211; Security Architecture</a> This week&#8217;s topic is Application Security. One of the most exposed application systems in any company is the web site. So, that [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">a23f6fdc5f0e9b7417605fedbe94a669</guid>
				<title>Jeta Gjana changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/110827/</link>
				<pubDate>Sat, 17 Jan 2015 04:26:15 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">bee8242a285f957953ce64a11be75c1f</guid>
				<title>Sunil Wattal wrote a new post on the site Business Intelligence</title>
				<link>http://community.mis.temple.edu/mis5101sec001f14/?p=210</link>
				<pubDate>Sat, 13 Dec 2014 16:00:56 -0500</pubDate>

									<content:encoded><![CDATA[<p><strong>Please email the completed exam to me (</strong><a href="mailto:swattal@temple.edu" rel="nofollow ugc"><strong><a href="mailto:swattal@temple.edu" rel="nofollow ugc">swattal@temple.edu</a></strong></a><strong>) before 6:00pm Sunday Dec 14, 2104 </strong></p>
<p>use of internet is not permitted while you are completing the exam.</p>
<p><a href="http://community.mis.temple.edu/mis5101sec001f14/files/2014/12/Exam-MIS-5101.docx" rel="nofollow ugc">Exam MIS 5101</a></p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a46858e798714b0918146c432d100620</guid>
				<title>Wen J. Chung posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5206senkof2014/2014/11/29/week-13-materials-posted/#comment-255</link>
				<pubDate>Thu, 04 Dec 2014 19:58:25 -0500</pubDate>

									<content:encoded><![CDATA[<p>Google Cloud Platform Receives PCI-DSS Compliance Certification</p>
<p><a href="http://www.securityweek.com/google-cloud-platform-receives-pci-dss-compliance-certification" rel="nofollow ugc">http://www.securityweek.com/google-cloud-platform-receives-pci-dss-compliance-certification</a></p>
<p>The article discussed about Google cloud platform is compliant with the latest PCI DSS security standard to handle and process credit card payment information. This will enable customers&hellip;<span class="activity-read-more" id="activity-read-more-109669"><a href="http://community.mis.temple.edu/mis5206senkof2014/2014/11/29/week-13-materials-posted/#comment-255" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/gregory-s-senko/" rel="nofollow ugc">Gregory S. Senko</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5206senkof2014" rel="nofollow ugc">Protection of Information Assets</a> <a href="http://community.mis.temple.edu/mis5206senkof2014/files/2014/11/MIS5206-Week-13.pdf" rel="nofollow ugc">MIS5206 Week 13</a>			]]></content:encoded>
				
				
							</item>
		
	</channel>
</rss>