Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 2Kaur, Amandeep
- 1Ahuja, Puneet
- 1Ancha, Jyothi Sharmila
- 1Bagla, Navjot
- 1Bhusri, Sagar
- 1Bonagiri, Raja Venkata Sandeep Kumar
-
2021-06-01
Kolencheril, Jerbin Joy, Messerschmidt, Mitchell, Bhusri, Sagar, Kotha, Vamshidhar Reddy, Jawanda, Gurcharan, Thomas, Betsy Elsa, Bonagiri, Raja Venkata Sandeep Kumar, Shah, Aakash, Nallarala, Abhilash, Garg, Gaurav, Pathak, Isha, Saggu, Ravdeep, Doddaka, Sravya, Pole, Sparsha, Singh, Satinderpal, Vadlamudi, Tejaswini, Sethuraman, Vigneshwar, Vangala, Vishista, Kaur, Amritpal, Kaur, Parminder, Chittimalla, Sai Kumar, Chittimalla, Sandeep, Patel, Priyesha, Kirandeep, Singh, Mandeep, Joshi, Dhanvi, Pathan, Rahim Khan, Ancha, Jyothi Sharmila, Kaur, Amandeep, Bagla, Navjot, Thakur, Preeti, Pugalenthi, Subaveena, Garrapu, Tharun, Gummakonda, Anirudh, Soobhri, Pawan, Kaur, Simranbir, Ahuja, Puneet, Rathod, Divya, Varma, Upasana, Nadipineni, Pavan kumar, Vemuri, Keerthi Kishore, Maadeereddy, Amulya, Raikar, Akshata Rajendra, Sunkara, Leela Suresh, Mehta, Akshat, Heena, Kaur, Kiranjit, Shah, Anish Manishkumar, Elumalai, Sweatha, Joshi, Mansi, Chauhan, Bhavyarajsinh, Nellore, Rishab Kumar Singh, Lindskog, Dale
In recent years, the prevalent utilization of technology and web applications has given rise to security vulnerabilities. This problem has dramatically increased the demand for proposed security models and mechanisms. Organizations find it challenging to secure their web applications and find...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.