Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2018
This paper presents an insight into attacks on Supervisory Control and Data Acquisition (SCADA) systems specifically focusing on systems that use the Modbus TCP protocol. A penetration testing approach is adopted using a novel penetration testing tool to (i) test the effectiveness and efficiency...
-
2009-01-05
The use of Google Health patient portal raises security and privacy concerns for the users. Since the portal stores sensitive personal and health information, it raises questions on security and privacy risks. The objective of this research is to identify those security and privacy risks of the...
-
2021-04-01
Brar, Kanwarpreet Singh, Bhola, Hitesh
This research outlines a template of audit and assurance program for NoSQL DBMSs based on the COBIT framework. With the increase in the use of NoSQL technologies in enterprises, there are various technical and managerial risks associated with them. Some of the major technical risks include lack...
-
Baseline security controls for HIA-compliant EMR systems using a tailored NIST RMF approach
Download2011-01-01
The proclamation of the Health Information Act (HIA) made the Custodian accountable for protecting the confidentiality, integrity, and availability of health information in Alberta, Canada. The health information that a Custodian creates, receives, maintains, or transmits must be protected...
-
Behavioral-based classification and identification of ransomware variants using machine learning
Download2018
Due to the changing behavior of ransomware, traditional classification and detection techniques do not accurately detect new variants of ransomware. Attackers use polymorphic and metamorphic techniques to avoid detection of signature -based systems. We use machine learning classification to...
-
Biometrics privacy impact assessment checklist for public educational institutions in Alberta
Download11/28/2010
This research stems from an assumption that the use of biometrics will eventually become commonplace in public educational institutions in Alberta. This paper proposes a Biometrics Privacy Impact Assessment Checklist (BPIAC) that can be used by public educational institutions in Alberta during...
-
Comparative analysis of operational malware Dynamic Link Library (DLL) injection live response vs. memory image
Download07/29/2012
One advanced tactic used to deliver a malware payload to a target operating system is Dynamic Link Library (DLL) injection, which has the capabilities to bypass many security settings. In cases of compromise involving DLL injection, volatile memory contains critical evidence, as these attacks...
-
2020
In recent times, ensuring data and user privacy has been one of the biggest impediments in information technology. With the advent of high penalties for privacy breaches and the high risk of reputation loss for a corporation, the need to comply with privacy regulations have never been greater....
-
2020
Database as a Service (DBaaS) is one of the key cloud computing services that is well-known as a type of Application-as-a-Service which gives users access to a database without downloading and installing software or performance configuration but maintains the customers database. DBaaS assumes the...