Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2022
This research analyzed selected contact tracing applications to identify potential vulnerabilities and geolocation of services used by these applications. MobSF framework and Android emulators were used to perform static and dynamic analysis of the applications. Security policies of applications...
-
2021-04-01
Single Packet Authorization (SPA) is the technique used to guard camouflaged network services against unauthorized users. SPA hides specific ports from the external world to reduce attacks at TLS ports until a cryptographically protected packet is received and authorized by the transport layer....
-
2021-06-01
Kolencheril, Jerbin Joy, Messerschmidt, Mitchell, Bhusri, Sagar, Kotha, Vamshidhar Reddy, Jawanda, Gurcharan, Thomas, Betsy Elsa, Bonagiri, Raja Venkata Sandeep Kumar, Shah, Aakash, Nallarala, Abhilash, Garg, Gaurav, Pathak, Isha, Saggu, Ravdeep, Doddaka, Sravya, Pole, Sparsha, Singh, Satinderpal, Vadlamudi, Tejaswini, Sethuraman, Vigneshwar, Vangala, Vishista, Kaur, Amritpal, Kaur, Parminder, Chittimalla, Sai Kumar, Chittimalla, Sandeep, Patel, Priyesha, Kirandeep, Singh, Mandeep, Joshi, Dhanvi, Pathan, Rahim Khan, Ancha, Jyothi Sharmila, Kaur, Amandeep, Bagla, Navjot, Thakur, Preeti, Pugalenthi, Subaveena, Garrapu, Tharun, Gummakonda, Anirudh, Soobhri, Pawan, Kaur, Simranbir, Ahuja, Puneet, Rathod, Divya, Varma, Upasana, Nadipineni, Pavan kumar, Vemuri, Keerthi Kishore, Maadeereddy, Amulya, Raikar, Akshata Rajendra, Sunkara, Leela Suresh, Mehta, Akshat, Heena, Kaur, Kiranjit, Shah, Anish Manishkumar, Elumalai, Sweatha, Joshi, Mansi, Chauhan, Bhavyarajsinh, Nellore, Rishab Kumar Singh, Lindskog, Dale
In recent years, the prevalent utilization of technology and web applications has given rise to security vulnerabilities. This problem has dramatically increased the demand for proposed security models and mechanisms. Organizations find it challenging to secure their web applications and find...
-
2021-04-01
Brar, Kanwarpreet Singh, Bhola, Hitesh
This research outlines a template of audit and assurance program for NoSQL DBMSs based on the COBIT framework. With the increase in the use of NoSQL technologies in enterprises, there are various technical and managerial risks associated with them. Some of the major technical risks include lack...
-
2021-06-01
Bains, Jayant Singh, Goyal, Rahul, Kopanati, Hemanth Varma, Savaram, Bhargav Krishna
IoT devices have become the future of many industries like household, security, etc. but these devices have a requirement that is that they should be connected to a network. This makes them vulnerable to outside attacks. If security is built into each device, it would cost more and would not...
-
2021-04-01
Adeniyi, Oluwatola, Chauhan, Digvijay, Ezidonye, Ugochukwu, Ayeni, Mojisola, Patel, Vishwa
The evolution of communication technologies led to active virtualization of computer network solutions and proliferation of the Software Defined Networks (SDN) as a centralized network infrastructure management tool. The SDN is a relatively new technology and rush to move products to the market...
-
2021-04-01
Oha, Chibueze Victor, Farouk, Fathima Shakoora, Patel, Pujan Pankaj, Meka, Prithvi, Nekkanti, Sowmya, Nayini, Bhageerath, Carvalho, Smit Xavier, Desai, Nisarg, Patel, Manishkumar
Connected devices are penetrating the market with an unprecedented speed. Networks that carry Internet of Things (IoT) traffic need highly adaptable tools for traffic analysis in order to detect and suppress malicious agents. This has prompted researchers to explore the various benefits machine...
-
2020
Johnson, Florence Mary Paul David
With increased financial loss and massive data breaches in the cloud-based environments, it is imperative for organizations to invest in new Identity and Access Management(IAM) solutions that are usable and are conforming to all the security requirements needed to protect cloud identities. A...
-
2020
Mobile antivirus technologies incorporate static analysis which involves the analysis of programs without its execution. This technique relies on pattern matching against a signature repository to identify malware, which can be easily tricked by transformation techniques such as obfuscation....