https://cphapps.temple.edu/wiki/it/apps/redcap
REDCap REDCap is a secure web application for building and managing online surveys and databases. While REDCap can be used to collect virtually any type of data in any environment (including compliance with 21 CFR Part 11, FISMA, HIPAA, and GDPR), it is specifically geared to support online and offline data capture for research studies and operations. Access REDCap Join the REDCap Community on ...
https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf
This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...
https://sites.temple.edu/care/
Cyberspace is fundamental to our national prosperity, as it is critical to economy, government, and day-to-day societal functioning. The Cybersecurity in Application, Research, and Education (CARE) Lab offers a social science approach to cybersecurity and seeks to foster a multidisciplinary dialog among academia, industry, nonprofits, and government. This intersectionality enables a creative ...
https://its.temple.edu/stay-secure/phishing
Phishing scams are sophisticated messages, typically emails, that appear to come from legitimate organizations (i.e. the university, your bank, Amazon, etc.), which are attempting to obtain your personal information (i.e. your password, account number, credit card, etc.). The message may ask you to respond with your personal information or include a link to a fraudulent website. Often, the ...
https://community.mis.temple.edu/mis5203sec951spring2022/files/2019/01/COBIT5-Ver2-enabling.pdf
Disclaimer ISACA has designed this publication, COBIT® 5: Enabling Processes (the ‘Work’), primarily as an educational resource for governance of enterprise IT (GEIT), assurance, risk and security professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or ...
https://www.fox.temple.edu/campaign/landing-page/it-auditing-and-cyber-security/
Secure Your Success Master the skills to identify, assess and control cyber security risks with the Master of Science in Information Technology Auditing & Cyber Security. Ensure robust information systems security and regulatory compliance within organizations while effectively mitigating the risks to the confidentiality, integrity and availability of critical information. Fast Facts: Complete ...
https://cis.temple.edu/~wangp/1057-PC/Lecture/Ch01.htm
The translation from high-level languages and assembly languages into machine languages is accomplished by special programs: compilers, interpreters, and assemblers. A compiler translates a source program in a high-level language into an object program in the machine language. An interpreter interprets and executes a program in a high-level language line by line. An assembler translates a ...
https://misdemo.temple.edu/
This server is used for instructional purposes only. It is used by the MIS Department in the Fox School of Business, at Temple University.
https://community.mis.temple.edu/mis2502sec001fall2025/
The exam is a closed book, closed notes. The exam will be a combination of multiple-choice and short-answer questions. Exam # 1 covers all the lectures up to “SQL 2: Getting Information Out of a Database – Advanced Queries”. We will have a review session on 9/23. Study Guide for Exam #1 (word) Study Guide for Exam #1 (ppt) Here are some practice questions, in case you want more exercise ...
https://registrar.temple.edu/2025-2026-academic-calendar
Religious, cultural and federal observances dates Dates may be subject to change. Updated on September 29, 2025.