Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2009-01-08
While some percentage of new-born malware has always evaded detection by anti-malware services, the quantity of malware able to compromise preventative controls is increasing. Therefore, enterprise security practitioners must confront the reality that malware will infect their organization's...
-
The modeling of an identity catching attack on the Universal Mobile Telecommunication System (UMTS) using attack tree methodology
Download2009-01-12
This research focuses on the modeling of an Identity Catching attacks in the Universal Mobile Telecommunication System (UMTS) using attack tree methodology. The possible ways an intruder could launch an identity catching attacks on the UMTS are identified and modeled using attack tree...
-
2012-01-01
The purpose of a kernel rootkit is to prevent detection of a compromised operating system. System Service Dispatch Table (SSDT) hooking has been employed by most Windows kernel rootkits as a method of hiding files, processes and registry keys from system and investigative utilities, by...
-
2020
IoT comprises of cyber-physical devices connected through the internet. These devices carry sensitive data and support critical services. Due to the sensitivity of user data shared across IoT, there is a risk of attacks such as spoofing, eavesdropping, and denial of service (DoS). These attacks...
-
2014-01-01
The Android operating system is increasingly exposed to a growing list of dangerous malware attacks, these attacks cost users and businesses. There is considerable research into Android malware detection, malware behavior, interaction and permissions. However, there is much less research effort...
-
2020
Web Applications are subject to threats as they tend to be vulnerable. This unit will be focusing on various web application vulnerability detection and attempting to exploit them as well. The main goal will be to identify and utilize some of the tools to perform penetration testing on existing...