About
16
Publications
46,322
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
0
Citations
Introduction
Motasem Hamdan is a Syrian-Lebanese content creator, instructor, swimmer and Entrepreneur who creates cyber security training videos and articles, provides marketing consultancy and writes research papers in healthcare cyber security.
Skills and Expertise
Current institution
Publications
Publications (16)
Abstract This chapter explains briefly how PHI in any healthcare provider could be protected in terms of physical and technical security guideline. PHI is very important to protect against fraud and identity theft to avoid both financial loss and reputation damage to the patient and the covered entity. This chapter could be a great aid to informati...
This presentation contains a detailed approach to the solution that was submitted to the first cisco packet tracer challenge and considered among the best 10
In this paper, a review of the Safety, Privacy and Security of Implantable Medical devices is written to shed lights on the current practices of privacy and security and how they apply to implantable medical devices to prevent data loss or theft. The paper reviews important security aspects of IMDs such as the software used, the communication proto...
This challenge write-up was one of the challenges administered by TrendMicro CTF 2017. This challenges require open source intelligence skills.
(this write-up has been send to google for evaluation and it's copyrighted, so if you want send your own solution..it's over yesterday.. you have to be registered in the scoreboard for your write-up to be considered)
MindReader was supposedly one of the easiest challenges at GoogleCTF and it’s after some guessing. So let’s start
First heading the...
Ncrack is a tool programmed and designed by Fotis Chantzis to use as a Brute Force tool to target small and large networks.
Basically Ncrack could be used instead of Hydra or Medusa to Test Networks against weak passwords and to ensure organization's policy regarding The use of strong passwords.
Ncrack can be used to audit against the following p...
Although I could not catch up with the challenges at their time but I like to practice the challenges and spread the knowledge. This challenge is named “The great Escape”
This challenge requires skills both in exploit development, reverse engineering and writing scripts using python. In this challenge we got a file named
“baby-6971f0aeb454444a72cb5b7ac92524cd945812c2.tgz”
CTF challenges are organized periodically challenging Security professionals to solve various issues with different domains of cyber security ranging from penetrations testing passing through forensic and not at the least of reverse engineering.This challenge focused on Network forensic.
Simplified Guidelines to help security professional in healthcare organizations in protecting and fighting cyber attacks
This Report aims at projecting the lights on the recent Cyber Security attacks that hit turkey’s infrastructure based on analyzing the vulnerabilities that opened the gateway for those attacks and how such an attacks could happen in the future if the appropriate security measures would not be implemented. The objective of this paper is to reach a c...