ERA is in the process of being migrated to Scholaris, a Canadian shared institutional repository service (https://scholaris.ca). Deposits to existing ERA collections are frozen until migration is complete. Please contact erahelp@ualberta.ca for further assistance
Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
Items in this Collection
- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out.
-
On the challenges of achieving IEC 62443 security requirements in time sensitive industrial networks
Download2018
The IEC 62443 security standards introduce the concepts of zones, conduits, and security levels as a way of segmenting and isolating sub-systems of an industrial control network. Network segmentation physically/logically partition the control network into separate communication zones to restrict...
-
PCI DSS compliance validation of different levels of merchants in a multi-tenant private cloud
Download2013-01-01
Payment Card Industry Data Security Standard (PCI DSS) compliance validation is an integral part of a security program used by credit card brands to enhance payment security through assessment of compliance to the PCI DSS. On the other hand, the introduction of virtualization technology as part...
-
PCI DSS implementation guidelines for small and medium enterprises using COBIT based implementation approach
Download2020
PCI DSS is a data security standard for companies that process, transmit, or store cardholder data to protect cardholder’s data against data theft and fraud. Companies must comply with PCI DSS requirements to maintain a secure environment while dealing, accepting, or processing credit or debit...
-
Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM
Download2008-01-01
Janot, Etienne, Zavarsky, Pavol
SQL Injection Attacks are a relatively recent threat to the confidentiality, integrity and availability of online applications and their technical infrastructure, accounting for nearly a fourth of web vulnerabilitie. In this paper based on a master thesis, and numerous references therein, we...
-
Privacy classification of health information in Alberta - issues, proposed solution and benefits
Download2008-01-04
This research paper reviews issues, proposes a solution and discusses the benefits of privacy classification for health information in Alberta. After a review and analysis of privacy classification of health information in Canada and the United Sates of America, this paper builds on existing...
-
2009-01-01
Distributed Denial of Service attacks have long been a staple of the Internet?s malware community that has not been dealt with outside of companies with large budgets. Many of these attacks use spoofing to obfuscate their originating address. It is this problem that I intend to address with a new...
-
2020
Johnson, Florence Mary Paul David
With increased financial loss and massive data breaches in the cloud-based environments, it is imperative for organizations to invest in new Identity and Access Management(IAM) solutions that are usable and are conforming to all the security requirements needed to protect cloud identities. A...
-
2012-01-01
Industries are highly dependent on reliable, accurate and automated control systems to monitor equipment that are critical to their operation. Supervisory Control And Data Acquisition (SCADA) is the most advanced control system which is being widely used in industries and it is an attractive...