Uusimmat viitteet

  • Cloud outsourcing guidelines and data protection regulation in Europe : Context of online banking self-service channels 

    Pulkkinen, Tomi (Jyväskylän ammattikorkeakoulu, 2018)
    The objective of the master’s thesis was to describe a compliance service architecture for self-service channels in online banking conforming to the EU General Data Protection Regulation and European Banking Authority’s ...
  • Personal Internet Privacy and Surveillance : Implementation and evasion of user tracking 

    Jokinen, Juha (Jyväskylän ammattikorkeakoulu, 2018)
    The modern Internet employs a vast number of different methods in order to track the user across sites. Information can be collected to enhance functionality but also for financial gain, as user data is a hot commodity in ...
  • Overlay Technologies and Microsegmentation in Data Centers 

    Takamäki, Masi (Jyväskylän ammattikorkeakoulu, 2018)
    The massive growth of data, availability and security requirements sets new challenges for organizations running a data center business nowadays. Traditional data center designs are not able meet these challenges anymore. ...
  • Threat detection of IPS in high load situation 

    Karttunen, Konsta (Jyväskylän ammattikorkeakoulu, 2018)
    Commercial network security solutions are typically measured by the throughput of the device in megabytes per second. Throughput is also quite often used to compare the different vendors and to size the security solution ...
  • Requirement specification for cyber security situational awareness : Defender's approach in cyber security exercises 

    Lötjönen, Jarno (Jyväskylän ammattikorkeakoulu, 2017)
    Digitalization of the world is rapid and poses new threats to developed societies. Cyber se- curity exercises held in JAMK University of Applied Sciences provide significant learning op- portunities to individuals and ...
  • Practical implementation of Windows end-point security controls : Facing the KATAKRI requirements 

    Leppänen, Tuomo (Jyväskylän ammattikorkeakoulu, 2017)
    National Security Auditing Criteria (KATAKRI) is used as a tool for assessing the ability of different organizations to protect classified information. The criteria themselves can be interpretative and as such difficult ...
  • Progressive web app with Angular 2 and ASP.NET 

    Kubala, Juraj (Jyväskylän ammattikorkeakoulu, 2017)
    This paper explained the process of designing and implementation of an application using the Angular framework and the ASP.NET framework. The application was developed in Inmics Oy and the main purpose of the application ...
  • Hardening email security with threat prevention platforms 

    Skogster, Anders (Jyväskylän ammattikorkeakoulu, 2017)
    Most of today’s email traffic consists of spam, malicious emails and other unwanted emails. These emails will fill up the user’s mailbox, infect your computer and possible the whole network you are using. Cygate offers its ...
  • Test automation for Flex Application : Case: Landis+Gyr Oy 

    Hudziak, Sabina (Jyväskylän ammattikorkeakoulu, 2017)
    Test automation has become more and more popular since it helps to save time, and with test automation, tasks impossible to carry out with manual testing can be performed. The thesis was assigned by Landis+Gyr Oy, an ...
  • IoT service platform architecture 

    Kalsi, Jukka (Jyväskylän ammattikorkeakoulu, 2017)
    Telia Finland had some old IoT kind of services such as automatic meter reading for electricity companies as well as alerting and monitoring services. These services based on old legacy technology developed internally, ...
  • Assessing maturity of disaster recovery planning : Case study 

    Ylikangas, Mika (Jyväskylän ammattikorkeakoulu, 2017)
    The idea for this study came from an interest to research disaster recovery planning as a process and how the maturity of the planning process can be measured. Maturity of a process can be described in terms of predictability ...
  • Human behavior from Cyber Security perspective 

    Tikkanen, Tommi (Jyväskylän ammattikorkeakoulu, 2017)
    The purpose of the thesis was to consider issues affecting human behavior and to assess if they could be better considered in the implementation of security practices. The study focuses on human behavior when an employee ...
  • Integrating Attack Graph Analysis System in Semi-Isolated Network Environment 

    Vanharanta, Jani (Jyväskylän ammattikorkeakoulu, 2017)
    The purpose of the thesis was to evaluate the usability aspects of logic-based attack graph analysis for a conventional Network Operation Centre (NOC) in a semi-isolated network environment. Operational and technical ...
  • Development of Secure IoT Based on Modern Microcontrollers 

    Haluška, Juraj (Jyväskylän ammattikorkeakoulu, 2017)
    This paper describes the development process of a secured Internet of Things (IoT) system. Firstly, it analyses the available technologies and methods for development of secure IoT. It also describes the most suitable ...
  • Decomposition of monolithic web application to microservices 

    Zaymus, Mikulas (Jyväskylän ammattikorkeakoulu, 2017)
    Solteq Oyj has an internal Wellbeing project for massage reservations. The task of this thesis was to transform the monolithic architecture of this application to microservices. The thesis starts with a detailed comparison ...

Näytä lisää