<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Temple MIS | Liang Yao | Activity</title>
	<link>https://community.mis.temple.edu/members/liang-yao/activity/</link>
	<atom:link href="https://community.mis.temple.edu/members/liang-yao/activity/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for Liang Yao.</description>
	<lastBuildDate>Thu, 23 Apr 2026 02:33:56 -0400</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">1b8b2d896eaf2cce4142038ee4ab818f</guid>
				<title>Liang Yao&#039;s profile was updated</title>
				<link>https://community.mis.temple.edu/activity/p/219243/</link>
				<pubDate>Thu, 13 Aug 2020 15:02:53 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">42420187201bfb71fcd0266368cff5f5</guid>
				<title>Liang Yao changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/219220/</link>
				<pubDate>Sun, 02 Aug 2020 00:59:39 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">98446b594ec95163dc65c07d4b6a6705</guid>
				<title>Liang Yao changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/188744/</link>
				<pubDate>Wed, 02 May 2018 17:43:42 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">67163edb2be89502b3d13ff0eec1dfe1</guid>
				<title>Liang Yao wrote a new post on the site IT Audit Process Fall 2020</title>
				<link>http://community.mis.temple.edu/mis5201sec702fall2020/?p=3425</link>
				<pubDate>Fri, 12 Jan 2018 20:39:01 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">67163edb2be89502b3d13ff0eec1dfe1</guid>
				<title>Liang Yao wrote a new post on the site IT Audit Process</title>
				<link>http://community.mis.temple.edu/mis5201sec001fall2019/?p=3425</link>
				<pubDate>Fri, 12 Jan 2018 20:39:01 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">0bdb171e7db72a6ea6df35a81c2b6afd</guid>
				<title>Liang Yao wrote a new post on the site MIS 5201-IT Audit Process</title>
				<link>http://community.mis.temple.edu/mis5201sec001sec701sp2018/?p=3425</link>
				<pubDate>Fri, 12 Jan 2018 20:39:01 -0500</pubDate>

									<content:encoded><![CDATA[<p>Test</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">279abdad8d38dae5e59d5aae122ac1cb</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1056</link>
				<pubDate>Tue, 04 Oct 2016 18:35:50 -0400</pubDate>

									<content:encoded><![CDATA[<p>Like your approch to answer the question one step further&#8230;</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">68a688a5d98077ff754fb4974a5f2fdc</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1055</link>
				<pubDate>Tue, 04 Oct 2016 18:32:50 -0400</pubDate>

									<content:encoded><![CDATA[<p>Those are good questions to ask if your client is using a VPN service provider&#8230;</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">56831f1fdf3ff400d731072df178551e</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1054</link>
				<pubDate>Tue, 04 Oct 2016 18:20:30 -0400</pubDate>

									<content:encoded><![CDATA[<p>Jumping the GFW&#8230; you need to find a VPN service provider, right?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">cfd09835e35ada20be7febc798e002a8</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1041</link>
				<pubDate>Tue, 04 Oct 2016 00:09:21 -0400</pubDate>

									<content:encoded><![CDATA[<p>Let&#8217;s discuss a few key controls can mitigate risks associated with VPN during the class&#8230;</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2b72914eab87fdab05583c3f7e2a9f68</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1040</link>
				<pubDate>Tue, 04 Oct 2016 00:06:36 -0400</pubDate>

									<content:encoded><![CDATA[<p>Leveraging the public network is one of the important reasons why VPN reduces the cost comparing leased lines&#8230;</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">965b9f6ee30054500d3cd072edac6c94</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1039</link>
				<pubDate>Tue, 04 Oct 2016 00:03:55 -0400</pubDate>

									<content:encoded><![CDATA[<p>Sean, well explained. Challenge question: can you explain to the class on Wednesday, how OSI layers map to TCP/IP?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e525435d6a3f2703907618402e70a589</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1036</link>
				<pubDate>Mon, 03 Oct 2016 23:44:32 -0400</pubDate>

									<content:encoded><![CDATA[<p>The terminology is called &#8220;tunneling&#8221;&#8230;</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">fa7e51e67b7e0ec3dc52792f0d052bc8</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1035</link>
				<pubDate>Mon, 03 Oct 2016 23:42:32 -0400</pubDate>

									<content:encoded><![CDATA[<p>VPN helps the firm reduce the cost, correct. But how? Explain Briefly.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">796b541be589225d4479e9556ea17621</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1034</link>
				<pubDate>Mon, 03 Oct 2016 23:38:23 -0400</pubDate>

									<content:encoded><![CDATA[<p>Those information are stored in the &#8220;routing table&#8221; within the router&#8230;the table provides the intelligence to the router to direct the traffic.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">5ff445f239ead1d1f34f6bd2eb85ad71</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1033</link>
				<pubDate>Mon, 03 Oct 2016 23:34:04 -0400</pubDate>

									<content:encoded><![CDATA[<p>An interesting article about how to select VPN vendor:</p>
<p><a href="http://www.howtogeek.com/221929/how-to-choose-the-best-vpn-service-for-your-needs/" rel="nofollow ugc">http://www.howtogeek.com/221929/how-to-choose-the-best-vpn-service-for-your-needs/</a></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">89aa23662ba53a51148bbd0102452638</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1032</link>
				<pubDate>Mon, 03 Oct 2016 23:31:33 -0400</pubDate>

									<content:encoded><![CDATA[<p>An intersting article about how to select a VPN service provider:</p>
<p><a href="http://www.howtogeek.com/221929/how-to-choose-the-best-vpn-service-for-your-needs/" rel="nofollow ugc">http://www.howtogeek.com/221929/how-to-choose-the-best-vpn-service-for-your-needs/</a></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">ed26c4e0b118c16fa4287274a1078fa8</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1028</link>
				<pubDate>Mon, 03 Oct 2016 23:08:12 -0400</pubDate>

									<content:encoded><![CDATA[<p>Once a user established VPN connection to his/her company&#8217;s next work, the node he/she logged in becomes part of the company&#8217;s network&#8230;.what controls a company should deploy to mitigate the risk  caused by the activities you mentioned above, such as downloading movies and music illegally?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f053e3bacb77f4510d54e32e2b971775</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1027</link>
				<pubDate>Mon, 03 Oct 2016 23:03:28 -0400</pubDate>

									<content:encoded><![CDATA[<p>Ian &#8211; Why do most of the firms choice VPN over some of the options you mentioned above?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">9bebf8b90426cdc0c9db502d98ea4be2</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/29/week-6-questions/#comment-1026</link>
				<pubDate>Mon, 03 Oct 2016 23:01:05 -0400</pubDate>

									<content:encoded><![CDATA[<p>Said &#8211; What controls should be implemented to mitigate the risk you referred to here?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">72386ff3597d0d57f86b658f1a75d48e</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-892</link>
				<pubDate>Wed, 28 Sep 2016 02:20:05 -0400</pubDate>

									<content:encoded><![CDATA[<p>There are different data leakage prevention related controls a company can implement. More to discussion in information security session.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">b2e17d7bc79c26f5c6a339160ae28766</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-891</link>
				<pubDate>Wed, 28 Sep 2016 02:10:29 -0400</pubDate>

									<content:encoded><![CDATA[<p>That&#8217;t exactly the reason why we need OS&#8230;.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">1357ae64ffae78669458b065224b74c5</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-821</link>
				<pubDate>Mon, 26 Sep 2016 01:33:13 -0400</pubDate>

									<content:encoded><![CDATA[<p>And don&#8217;t forget the resilience piece&#8230;very important. In addition, how about physical access to the computers, whether servers or desktops?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f4a8df565a62ac5a37be475a5744b839</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-819</link>
				<pubDate>Mon, 26 Sep 2016 00:57:47 -0400</pubDate>

									<content:encoded><![CDATA[<p>can patch remediate the risk caused by &#8220;zero day&#8221; attack?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d7eb0e330ca95ad232e1085441621ae4</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-818</link>
				<pubDate>Mon, 26 Sep 2016 00:48:56 -0400</pubDate>

									<content:encoded><![CDATA[<p>Sean &#8211; how about this recent news from CBS:</p>
<p>&#8220;US military uses 8-inch floppy disks to coordinate nuclear force operations&#8221;</p>
<p>Your thoughts?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">0a4ed1dccbda393207409169f931f7f4</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-816</link>
				<pubDate>Mon, 26 Sep 2016 00:44:52 -0400</pubDate>

									<content:encoded><![CDATA[<p>That&#8217;s why it&#8217;s imperative to develop a disaster recovery plan. We will cover DR and how to audit DR plan soon.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">8ca03b2beb3eb12ed707c34fd12d6f79</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-815</link>
				<pubDate>Mon, 26 Sep 2016 00:40:59 -0400</pubDate>

									<content:encoded><![CDATA[<p>Sean, indeed, one of the very important tasks for IT auditors is to verify technology policies are adherences. In this case, what do you think a firm should do in addition to develop a malware related IT policy? Let&#8217;s discuss during the class. Thx.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">41de947f65dee70cfc406a1d38ef7935</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-814</link>
				<pubDate>Mon, 26 Sep 2016 00:36:59 -0400</pubDate>

									<content:encoded><![CDATA[<p>What cause the &#8220;blue scree of death&#8221;?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d4cbb821921429555b4eb1b9fa11fc61</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-812</link>
				<pubDate>Mon, 26 Sep 2016 00:27:09 -0400</pubDate>

									<content:encoded><![CDATA[<p>A lot good points, just one correction, OS is a software, facilitate the communication between applications and computer hardware components. Itself doesn&#8217;t include hardware part.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f7144717e2e3a547ddf3ec101bc5d2a5</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/22/week-4-5-questions/#comment-811</link>
				<pubDate>Mon, 26 Sep 2016 00:23:30 -0400</pubDate>

									<content:encoded><![CDATA[<p>This follow up question is for ALL of you: In your opinion, which OS is easier to protect, a Mainframe computer or Distributed computer environment (e.g windows and Unix/Linux) and why?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">bcdf63ccb810daa5e234f764213943df</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-749</link>
				<pubDate>Wed, 21 Sep 2016 00:46:17 -0400</pubDate>

									<content:encoded><![CDATA[<p>Correct, one area IT auditor should always review is the IT team&#8217;s education, experience and training program.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f1b836e596ebc80a45c85d634673a2a7</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-748</link>
				<pubDate>Wed, 21 Sep 2016 00:42:19 -0400</pubDate>

									<content:encoded><![CDATA[<p>Prepare to discuss controls should be in place to mitigate those risks&#8230;</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">a211025da5e9a57d883ed15a39b3499f</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-747</link>
				<pubDate>Wed, 21 Sep 2016 00:40:37 -0400</pubDate>

									<content:encoded><![CDATA[<p>What&#8217;s another important reason to maintaining currency of a database system?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">318a13e65c52b922f36a17a4c2b8e909</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-726</link>
				<pubDate>Tue, 20 Sep 2016 00:10:16 -0400</pubDate>

									<content:encoded><![CDATA[<p>Deepali &#8211; Thanks for bring in the real life example. However, the sample you brought up is rather from human aspect not a data corruption issue. We can discuss during the class.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">867a8cd36302731422bf7ca588235475</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-725</link>
				<pubDate>Tue, 20 Sep 2016 00:07:23 -0400</pubDate>

									<content:encoded><![CDATA[<p>Good point. We will discuss data recovery strategy in a few weeks.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">299ad682617521eab75c9a215b42603e</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-724</link>
				<pubDate>Tue, 20 Sep 2016 00:04:26 -0400</pubDate>

									<content:encoded><![CDATA[<p>Actually RDMS is a type of DBMS. It&#8217;s based on relationship among tables.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">baba63a7ac1a36ca111b7cea8fadfc97</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-723</link>
				<pubDate>Mon, 19 Sep 2016 23:49:21 -0400</pubDate>

									<content:encoded><![CDATA[<p>Data duplication can be reduced via a process called Normalization. We will discuss during the class.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">bd7be1f554f2d5cb59f8a8c1a469fc1b</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-722</link>
				<pubDate>Mon, 19 Sep 2016 23:47:05 -0400</pubDate>

									<content:encoded><![CDATA[<p>You brought up several important subjects here: authentication vs. authorization; protecting data at rest, data in use and data in transition. Those are things concern IT auditors. We will discuss on Wednesday.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">40547b6bf5519fd118f3e52e7c28e96c</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-721</link>
				<pubDate>Mon, 19 Sep 2016 23:41:35 -0400</pubDate>

									<content:encoded><![CDATA[<p>Database Administrator (DBA) and database developer are two different roles and we will discuss during the class.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e25064239d0499cce482e7d38978bc02</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-719</link>
				<pubDate>Mon, 19 Sep 2016 23:39:33 -0400</pubDate>

									<content:encoded><![CDATA[<p>RDMS has built in mechanism to handle concurrent access; it also has the security feature to assign different types of access; usually a database consists a lot of objects, including a lot of tables, access can be granted to those objects.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">a79c8b5eb09ba0cd618ff7ccba4683bc</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-718</link>
				<pubDate>Mon, 19 Sep 2016 23:34:36 -0400</pubDate>

									<content:encoded><![CDATA[<p>One reason database can provide fast query results is via indexing. How does index work? Can you find out and explain during the class?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f274e8ac859f1e6d0a5499c7e223f9f6</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-715</link>
				<pubDate>Mon, 19 Sep 2016 23:30:30 -0400</pubDate>

									<content:encoded><![CDATA[<p>From IT audit aspects, can you list a few key controls auditors must to take into consideration while auditing a relational database?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">ffdc5ff1b8ad73710d20df46cbfcfbc5</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-714</link>
				<pubDate>Mon, 19 Sep 2016 23:27:09 -0400</pubDate>

									<content:encoded><![CDATA[<p>Any security implications or improvements?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">278880c1bd833997118c39cc0c8ed329</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-712</link>
				<pubDate>Mon, 19 Sep 2016 23:22:25 -0400</pubDate>

									<content:encoded><![CDATA[<p>Yu Ming &#8211; Can you provide an example of how normalization works during the class? Let  me know. Thx</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">da183a12b38907254b7c319931428e4c</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-617</link>
				<pubDate>Sun, 18 Sep 2016 13:58:09 -0400</pubDate>

									<content:encoded><![CDATA[<p>Correct. DBMS should be placed behind the firewall. However, they are not immune from the attacks. We will discuss the concept of &#8220;layers of defense&#8221; during this course.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2f3749879f47416e3a403a4098d46594</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-616</link>
				<pubDate>Sun, 18 Sep 2016 13:53:50 -0400</pubDate>

									<content:encoded><![CDATA[<p>Paul &#8211; Think about what controls can be implemented to mitigate those risks&#8230;let&#8217;s discuss during the class.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7851ddff2d71d2ab82a1e480af0e03d9</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-615</link>
				<pubDate>Sun, 18 Sep 2016 13:52:46 -0400</pubDate>

									<content:encoded><![CDATA[<p>Can you think about a scenario that RDMS is not idea and bring to the class?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">a4f0690566e2867277da032d0d401d57</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-614</link>
				<pubDate>Sun, 18 Sep 2016 13:50:42 -0400</pubDate>

									<content:encoded><![CDATA[<p>What types of relationship among tables? What&#8217;s the need to establish relationship among tables?</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">13dcdbf8a985fd04606b128be3a24d26</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-613</link>
				<pubDate>Sun, 18 Sep 2016 13:48:21 -0400</pubDate>

									<content:encoded><![CDATA[<p>Sorry, miss-spelled your name, Priya.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">4ef8692437b788ac062a6fd0f2f5a045</guid>
				<title>Liang Yao posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5205fall16/2016/09/14/week-3-questions/#comment-612</link>
				<pubDate>Sun, 18 Sep 2016 13:47:30 -0400</pubDate>

									<content:encoded><![CDATA[<p>Pyria, challenge question: prepare to discuss types of database constraints during the class.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/heather-d-makwinski/" rel="nofollow ugc">Heather D Makwinski</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5205fall16" rel="nofollow ugc">ITACS 5205</a> What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks [&hellip;]			]]></content:encoded>
				
				
							</item>
		
	</channel>
</rss>