• Requirement specification for cyber security situational awareness : Defender's approach in cyber security exercises 

      Lötjönen, Jarno (Jyväskylän ammattikorkeakoulu, 2017)
      Digitalization of the world is rapid and poses new threats to developed societies. Cyber se- curity exercises held in JAMK University of Applied Sciences provide significant learning op- portunities to individuals and ...
    • Practical implementation of Windows end-point security controls : Facing the KATAKRI requirements 

      Leppänen, Tuomo (Jyväskylän ammattikorkeakoulu, 2017)
      National Security Auditing Criteria (KATAKRI) is used as a tool for assessing the ability of different organizations to protect classified information. The criteria themselves can be interpretative and as such difficult ...
    • Progressive web app with Angular 2 and ASP.NET 

      Kubala, Juraj (Jyväskylän ammattikorkeakoulu, 2017)
      This paper explained the process of designing and implementation of an application using the Angular framework and the ASP.NET framework. The application was developed in Inmics Oy and the main purpose of the application ...
    • Hardening email security with threat prevention platforms 

      Skogster, Anders (Jyväskylän ammattikorkeakoulu, 2017)
      Most of today’s email traffic consists of spam, malicious emails and other unwanted emails. These emails will fill up the user’s mailbox, infect your computer and possible the whole network you are using. Cygate offers its ...
    • Test automation for Flex Application : Case: Landis+Gyr Oy 

      Hudziak, Sabina (Jyväskylän ammattikorkeakoulu, 2017)
      Test automation has become more and more popular since it helps to save time, and with test automation, tasks impossible to carry out with manual testing can be performed. The thesis was assigned by Landis+Gyr Oy, an ...
    • IoT service platform architecture 

      Kalsi, Jukka (Jyväskylän ammattikorkeakoulu, 2017)
      Telia Finland had some old IoT kind of services such as automatic meter reading for electricity companies as well as alerting and monitoring services. These services based on old legacy technology developed internally, ...
    • Assessing maturity of disaster recovery planning : Case study 

      Ylikangas, Mika (Jyväskylän ammattikorkeakoulu, 2017)
      The idea for this study came from an interest to research disaster recovery planning as a process and how the maturity of the planning process can be measured. Maturity of a process can be described in terms of predictability ...
    • Human behavior from Cyber Security perspective 

      Tikkanen, Tommi (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of the thesis was to consider issues affecting human behavior and to assess if they could be better considered in the implementation of security practices. The study focuses on human behavior when an employee ...
    • Integrating Attack Graph Analysis System in Semi-Isolated Network Environment 

      Vanharanta, Jani (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of the thesis was to evaluate the usability aspects of logic-based attack graph analysis for a conventional Network Operation Centre (NOC) in a semi-isolated network environment. Operational and technical ...
    • Development of Secure IoT Based on Modern Microcontrollers 

      Haluška, Juraj (Jyväskylän ammattikorkeakoulu, 2017)
      This paper describes the development process of a secured Internet of Things (IoT) system. Firstly, it analyses the available technologies and methods for development of secure IoT. It also describes the most suitable ...
    • Decomposition of monolithic web application to microservices 

      Zaymus, Mikulas (Jyväskylän ammattikorkeakoulu, 2017)
      Solteq Oyj has an internal Wellbeing project for massage reservations. The task of this thesis was to transform the monolithic architecture of this application to microservices. The thesis starts with a detailed comparison ...
    • Improving Crash Uniqueness Detection in Fuzzy Testing : Case JyvSectec 

      Pudas, Mikko (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of fuzzing was defined to send malformed data in order to crash the program under test. Fuzzing has been defined as the most powerful test automation tool for discovering the security critical problems of ...
    • Trusted Communication in SDN OpenFlow Channel : Investigating Assumed Trusted Communication between SDN Controller and Switch and Possible Attack Scenarios 

      Haapajärvi, Marika (Jyväskylän ammattikorkeakoulu, 2017)
      Originally the subject of the research was Software Defined Networking (SDN) and particularly the threats towards the architecture and the SDN controller. However, during the research, it became evident that the protocol ...
    • Well-being reservation system 

      Gana, Martin (Jyväskylän ammattikorkeakoulu, 2017)
      Solteq is a company offering E-commerce services to its clients. IBM WebSphere Com- merce is used in most of the projects. There was a need to use more modern technologies so that Solteq could improve its competitiveness ...
    • Enhancing Cyber Security for SME organizations through self-assessments : How self-assessment raises awareness 

      Hassinen, Tarmo (Jyväskylän ammattikorkeakoulu, 2017)
      This thesis primarily studied the importance of self-assessment in increasing business organizations’ cyber security awareness of their ICT environment. The secondary studied item was the relevance of self-assessment in ...
    • Instant mobile receiver : Building a service on top of the Amazon Cloud Services 

      Pastuszek, Lukas (Jyväskylän ammattikorkeakoulu, 2016)
      This paper describes the design, implementation and deployment of a 3-application system including the information of used technologies, architectures and services. The frontend application is a static web application ...
    • Implementing security controls in existing system 

      Savonen, Henri (Jyväskylän ammattikorkeakoulu, 2016)
      The main objective is the investigation of possibilities of elevating existing and old information system to comply with the current information security criteria. The elevation process of one system security is included, ...
    • Linux Patch Management : Comparison of Practical Implementations 

      Pulliainen, Teemu (Jyväskylän ammattikorkeakoulu, 2016)
      Recent public, high-profile vulnerabilities in widely used IT architecture components pose a significant risk to IT systems. As far as public vulnerabilities are concerned, in most cases a mitigation is readily available ...
    • CI System Relocation 

      Tuovila, Jani (Jyväskylän ammattikorkeakoulu, 2016)
      A network of partner companies has established a Virtual Enterprise in order to develop a complex telecommunication device for the customer. The project has been ongoing already for several years and during that time a ...
    • Implementing situational awareness 

      Hulkkonen, Timo (Jyväskylän ammattikorkeakoulu, 2016)
      Implementation of situational awareness system became an objective when Finnish national regulations for A-class systems, in the context of healthcare systems were updated. The updated criteria require IT service providers ...