This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out. Tools such as snort and Wireshark are used for this...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out.
-
On the challenges of achieving IEC 62443 security requirements in time sensitive industrial networks
Download2018
The IEC 62443 security standards introduce the concepts of zones, conduits, and security levels as a way of segmenting and isolating sub-systems of an industrial control network. Network segmentation physically/logically partition the control network into separate communication zones to restrict...
-
Ontogeny of Albertosaurus sarcophagus: Speedy adults or fast juveniles? How the development of the species affected the biomechanics and the implications for hunting strategies
Download2014-08-04
The focus of this study was to examine the overall speeds that can be reached by Albertosaurus sarcophagus and comparing the results of Struthio camelus to determine the likelihood of those speeds being reached. The first step of the study was to determine the allometric relations that were...
-
2022
This is an action research project which used mixed-methods to address both parental self-efficacy in mathematics and the development of appropriate homework for upper-elementary students. Literature was reviewed in the fields of self-efficacy, ethnomathematics, open-ended questions, and the role...
-
PCI DSS compliance validation of different levels of merchants in a multi-tenant private cloud
Download2013-01-01
Payment Card Industry Data Security Standard (PCI DSS) compliance validation is an integral part of a security program used by credit card brands to enhance payment security through assessment of compliance to the PCI DSS. On the other hand, the introduction of virtualization technology as part...
-
PCI DSS implementation guidelines for small and medium enterprises using COBIT based implementation approach
Download2020
PCI DSS is a data security standard for companies that process, transmit, or store cardholder data to protect cardholder’s data against data theft and fraud. Companies must comply with PCI DSS requirements to maintain a secure environment while dealing, accepting, or processing credit or debit...
-
Pedagogies in physical education and wellness: How teachers promote secondary student engagement in physical education and wellness
Download2022
Student participation in physical education programs often diminishes when the course becomes an elective in high school. Throughout the history of physical and health education, there have been numerous pedagogical shifts, resulting in differing levels of student engagement. At the centre of...
-
Peer support and teacher self-efficacy: A case study of the transition to emergency remote teaching during COVID-19
Download2021-04-01
Understanding how teachers used peer-to-peer support to navigate challenging teaching situations lies at the heart of this research. The purpose of this research was to better understand how engaging in peer support between teachers shapes teacher self-efficacy. This project used a case study...