Theseus - Selaus asiasanan mukaan "data security"
Viitteet 161-180 / 206
-
Security Activities Integrated into DevOps Software Development and Operation Processes
(2022)Web application security and safety are important issues for all digital service users. The speed of application development cycles, constant changes, and continuous integrations cause many challenges to ensure and maintain ... -
Security analysis of blockchain technology
(2019)This thesis was commissioned by a financial management company. This company handles big amounts of sensitive data of clients which eventually needs to be transferred to them. The company recognizes that the technology is ... -
Security Analysis of Web Application for Industrial Internet of Things
(2022)With the technological advancement in Internet of Things (IoT), modern manufacturing and service indus-tries are massively shifting towards connected devices and creating a connected ecosystem by deploying third-party ... -
Security assessment of databases
(2020)Database security is playing an increasingly central role in organizations today. Databases contain the most important and sensitive data. In this research, a security assessment of several different databases for a public ... -
Security Criteria Awareness
(2021)Dell is a large American company with roots dating back to 1984. In 2015, Dell embarked on a project to acquire EMC Corporation, which was completed in one of the largest acquisitions in the IT industry and re-sulted in ... -
Security management during pandemic
(2021)Opinnäytetyössä keskitytään vastaamaan tutkimuskysymyksiin, kuten lähihistorian eri pandemioiden vaikutukset turvallisuudenjohtamiseen, sillä turvallisuustasot on asetettava korkealle myös ennen pandemiaa, pandemian ... -
Security Threats and Data Protection in Android Devices
(2018)The main aim of this thesis is to provide an awareness of the security threats found in Android smart devices. Educate end users on how these smart devices pose threats in our society and personal life. Smartphones and ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Single sign-on in a growing start-up
(2021)This thesis was written to reflect and report on a project to select and implement a single sign-on identity provider at Castor EDC. Castor was in an intense growth phase from under 50 employees to more than 100 the stringent ... -
Smart authentication and authorization system
(2021)The main goal of this thesis is to create a smart security system that will reduce the risk of hacking and theft using Internet of Things (IoT) technology. During the project, a prototype system was designed that will use ... -
SNMP instrumentation in robustness testing
(2010)The general topic of this thesis is Simple Network Management Protocol (SNMP) as an instrumentation method in robustness testing. This thesis provides information about software security testing and SNMP as an instrumentation ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Software bills of materials in production environments
(2024)The practice of using open-source components across different software ecosystems is widespread. This makes is easier for attackers to exploit vulnerabilities without crafting specific attacks. A question then emerges about ... -
SOFTWARE DEVELOPMENT IN THE CLOUD, ITS IMPACT AND SECURITY CHALLENGES
(2022)This thesis examines software development in cloud computing, its impact, and security challenges. In the aftermath Most companies are adopting cloud computing as they feel it is a promising technology. However, the users ...Rajoitettu käyttöoikeus / Restricted access / Tillgången begränsad -
Software Lifecycle Management Processes Frameworks and Cloud Computing in SMEs
(2024)The aim of the study was to examine the relationship between the software development life cycle and cloud computing and analyze their potential compatibilities with the necessary process. In addition, the research integrated ... -
SQL versus NoSQL : comparison case MySQL versus MongoDB
(2023)The growing volume of data and the demand for data-driven applications emphasizes the critical role of selecting an appropriate Database Management System (DBMS). This thesis addresses the significant impact of this decision ... -
Statistical evaluation of artificial intelligence -based intrusion detection system
Advances in intelligent systems and computing (Springer, 2020)Training neural networks with captured real-world network data may fail to ascertain whether or not the network architecture is capable of learning the types of correlations expected to be present in real data. In this ... -
Steganology and information hiding : Stegop2py: embedding data in TCP and IP headers
(2021)In the time when the explosion of electronic and digital technologies happened, communication technologies concurrently suffered the same growth. Nowadays, for two parties to communicate, it is as easy as dialling a number, ... -
Strategic Threat Modelling
(2023)Uhkmallinnuksessa tunnistetaan ja kommunikoidaan tietoa uhista, jotka voivat vaikuttaa tiettyyn tietojärjestelmään tai tietoverkkoon. Strategisella tasolla tämä käsite laajennetaan koko organisaation kattavaksi: Mitkä ... -
Study on cyber security awareness in Finnish ports and shipping companies
(2021)In our study we wanted to find out what the level of cyber security awareness is within Finnish shipping companies and Finnish ports engaged in international trade. The maritime sector is becoming more digitalized and ... -
The systemic change from the use of biographical evidence of identity to a biometric self-service model of multi-modal authentication : A case study of the paradigm shift in a Finnish government agency’s identity management
(2023)Olemme synnynnäisesti mukavuuden haluisia ja tutkimusten mukaan myös huonoja tekemään päätöksiä. Suhtaudumme epäilevästi kaikkeen uuteen, mutta kun jokin asia on meille tuttua, siitä on vaikea luopua. Muutosvastaisuus on ... -
Technical automation of Windows platform testing
(2019)The hype of digitalization, artificial intelligence, and automation has brought with it the need to automate all manual operations that are performed more than once. Cyber security scene has begun to rely on automation to ...
















