Motasem Hamdan

Motasem Hamdan
American University of Science and Technology · Department of Biomedical Engineering

Master of Cyber Security

About

16
Publications
39,358
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
0
Citations
Introduction
Master of Cyber Security Double Major, Biomedical Engineering; Healthcare Management
Education
September 2016 - September 2019
Charles Sturt University
Field of study
  • Cyber Security
September 2016 - September 2018
Bahçeşehir University
Field of study
  • Biomedical Engineering
November 2011 - December 2014
American University of Science and Technology
Field of study
  • Biomedical Engineering / Healthcare Management

Publications

Publications (16)
Method
Full-text available
Abstract This chapter explains briefly how PHI in any healthcare provider could be protected in terms of physical and technical security guideline. PHI is very important to protect against fraud and identity theft to avoid both financial loss and reputation damage to the patient and the covered entity. This chapter could be a great aid to informati...
Presentation
Full-text available
This presentation contains a detailed approach to the solution that was submitted to the first cisco packet tracer challenge and considered among the best 10
Article
Full-text available
In this paper, a review of the Safety, Privacy and Security of Implantable Medical devices is written to shed lights on the current practices of privacy and security and how they apply to implantable medical devices to prevent data loss or theft. The paper reviews important security aspects of IMDs such as the software used, the communication proto...
Article
Full-text available
This challenge write-up was one of the challenges administered by TrendMicro CTF 2017. This challenges require open source intelligence skills.
Article
Full-text available
(this write-up has been send to google for evaluation and it's copyrighted, so if you want send your own solution..it's over yesterday.. you have to be registered in the scoreboard for your write-up to be considered) MindReader was supposedly one of the easiest challenges at GoogleCTF and it’s after some guessing. So let’s start First heading the...
Article
Full-text available
Ncrack is a tool programmed and designed by Fotis Chantzis to use as a Brute Force tool to target small and large networks. Basically Ncrack could be used instead of Hydra or Medusa to Test Networks against weak passwords and to ensure organization's policy regarding The use of strong passwords. Ncrack can be used to audit against the following p...
Article
Full-text available
Although I could not catch up with the challenges at their time but I like to practice the challenges and spread the knowledge. This challenge is named “The great Escape”
Article
Full-text available
This challenge requires skills both in exploit development, reverse engineering and writing scripts using python. In this challenge we got a file named “baby-6971f0aeb454444a72cb5b7ac92524cd945812c2.tgz”
Article
Full-text available
CTF challenges are organized periodically challenging Security professionals to solve various issues with different domains of cyber security ranging from penetrations testing passing through forensic and not at the least of reverse engineering.This challenge focused on Network forensic.
Poster
Full-text available
Simplified Guidelines to help security professional in healthcare organizations in protecting and fighting cyber attacks
Technical Report
Full-text available
This Report aims at projecting the lights on the recent Cyber Security attacks that hit turkey’s infrastructure based on analyzing the vulnerabilities that opened the gateway for those attacks and how such an attacks could happen in the future if the appropriate security measures would not be implemented. The objective of this paper is to reach a c...
Working Paper
Full-text available

Projects

Projects (2)
Archived project
Controlling Bandwidth consumption and Prioritizing critical packets over the network infrastructure.