Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Adeyemi, Grace Moyo
Cloud computing is evolving as a key computing platform for sharing technological resources including infrastructures, software and business applications. Cloud has proven to bring many promising benefits to organizations. As a result, increasing number of companies are migrating legacy...
A comparative case study on Cloud Service Providers, their Service Level Agreements, and lost of availability due to security breach: Amazon EC2 and S3, and Microsoft Windows Azure Compute and StorageDownload
Even though Amazon and Microsoft are promising 99.9 to 100 percent service uptime for their cloud compute and storage services, they don't take responsibility of service downtime that could result from Distributed Denial of Service (DDoS) and outside malicious attacks. The objective of this paper...
This study compares the protection of Electrical Infrastructure (EI) in Cyber Security Strategies (CSS) of the United States (U.S) and Australia. Employing three key indicators as interpretive frameworks - (I) Standards and guidelines, (II) policies and (III) security controls, this study takes...
A comprehensive framework for a risk and role based enterprise security awareness, training and education program for ISO/IEC 27002 complianceDownload
Organizations are faced with a variety of ever changing information security risks. This study examines the state of information security, user groups and user roles responsible for and ISO/IEC domains required for risk mitigation in a large public organization in Canada. The objective is to...
This research paper develops a conceptual framework for internal control, suitable for small business owners, to guide the effective selection and implementation of internal controls that help prevent and detect occupational fraud. Although the de facto internal control framework, the Committee...
In this research paper, a new systematic approach to segmenting nodes in an internetwork is proposed. The research paper shows advantages of screening traffic between clients and the servers with which they communicate. The proposed strategy is intended to supplement, but not displace, other...
There are various cryptocurrency exchanges which are accessible from all over the world. Due to the uptrend in cryptocurrency, interest in cryptocurrency seems to be increasing. Although cryptocurrency exchanges involve blockchain technology, it is ineffective in the management of security to...
A proposed purchase cycle audit approach using blockchain technology to increase audit effectiveness and reduce fraudDownload
Over the years, purchasing cycle fraud schemes have been the greatest risks of fraud for most organizations. Blockchain technology can maintain transactional data with full decentralization and reducing the growing number of cases of fraud in companies and organizations. This paper focuses mainly...
While privacy issues in children's mobile applications are becoming increasingly sophisticated, the permissions in these applications are undergoing development without proper security implementation. Mobile applications with excessive privacy features can cause serious data leakages and other...
This research paper focuses on the impact of intentional and unintentional exposure or leakage of sensitive personal data elements that- when aggregated and used or disclosed in an unauthorized manner- could impact the employees of an organization. Doxing usually escalates to hacking, espionage...