Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2020
The role of wearable connected devices in healthcare is rapidly gaining importance. Collection of data through these smart devices is a key instrument in advancing biomedical research and in tracking of health indicators of an individual. Highly sensitive medical data requires advanced protection...
-
Internet security governance comparative analysis of country code Top Level Domain (ccTLD) administration
Download2008-01-12
Phishing presents a significant security challenge to Internet users, registries and registrars worldwide. The costs of phishing are significant and growing, and the increasing volume of phishing threatens to destroy the fabrics of online transactions. Vulnerabilities in domain registration...
-
Investigating the knowledge, attitudes and habits of academic users regarding computer usage policy
Download2010-01-08
Academic organizations typically require individuals using their information technology resources to agree to follow a set of rules regarding usage of those facilities and resources that the organization sets out as its computer usage policy document. Users may have to read a document, agree...
-
2009-01-08
Videoconferencing over Internet Protocol (IP) is a real-time, collaborative, virtual communication tool. However, current videoconferencing technology has not been built with the protection of the participants' privacy in mind. It is concerned only with the privacy of the conference session,...
-
2021-06-01
Bains, Jayant Singh, Goyal, Rahul, Kopanati, Hemanth Varma, Savaram, Bhargav Krishna
IoT devices have become the future of many industries like household, security, etc. but these devices have a requirement that is that they should be connected to a network. This makes them vulnerable to outside attacks. If security is built into each device, it would cost more and would not...
-
Measuring performance of two application servers for Java developed Web Services under heavy loads
Download2009-01-05
Businesses are increasingly migrating legacy web applications towards Web Services (WS). However, there is a limited choice available for platforms which can support this technology. Furthermore, these same legacy applications are increasingly the prey of DDoS attacks in order to deprive...
-
Mid-size Canadian businesses investment in BCM: How to proactively prevent disruptions and react to interruption of vital operations
Download2014-01-01
This research paper will propose an effective and financially feasible Disaster Recovery/Business Continuity Framework that is compatible with midsize Canadian businesses, provide recommendations for the implementation of a DRP for a midsize Canadian enterprise based on the proposed framework,...
-
2008-01-02
Governance directly impacts information security, focusing in protecting business-critical assets, providing confidentiality, integrity, and availability. Good security practices give assurance of information security to other governments and businesses. In particular, the request for better...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.