Theseus - Selaus asiasanan mukaan "data security"

    • Technical automation of Windows platform testing 

      Romanov, Mikael (2019)
      The hype of digitalization, artificial intelligence, and automation has brought with it the need to automate all manual operations that are performed more than once. Cyber security scene has begun to rely on automation to ...
    • Technical implementation and operational enhancements of a vulnerability management tool in an organization 

      Rantalaiho, Vertti (2024)
      Opinnäytetyössä tutkittiin haavoittuvuudenhallintajärjestelmien käyttöönottoa ja kehittämistä organisaatioissa, jossa erityisesti keskityttiin tehokkuuteen kasvavien kyberturvallisuusuhkien luomien paineiden keskellä. Työn ...
    • Technical review setup for Amazon Web Services : assessing Amazon cloud computing service configurations 

      Lehtinen, Joni (2023)
      This thesis provides a comprehensive technical review setup to audit various Amazon Web Services (AWS) services. The objectives were to describe the functionalities and features of important AWS services and to assess their ...
    • Technology in FinTech - How Trends Shape Finance 

      Dang, Hoang Nam Phuong (2021)
      The finance and banking industry has been reshaped due to the new digitalization trends. FinTech becomes a common concept in the finance field, representing outstanding innovations taken by organizations engaged in ...
    • Telecommuting 

      Agbodzie, Elom (2020)
      The world as we have always known it ceased to exist on the eve of the outbreak of COVID-19 pandemic, what propelled us into a drastic shift regarding both in our private professional lives. This gave rise to one of the ...
    • The areas of application of blockchain in a supply chain to improve its operations 

      Gonzalez, Pablo (2022)
      The goal of this work was to explore the emerging technology known as blockchain and how it can be used for supply chain management. One of the main objectives was to find out if companies can benefit from blockchain and ...
    • The computer network security implementation in an enterprise project 

      Pukelyte, Ilona (2021)
      The main purpose of this thesis is to investigate existing information security technologies and implement these elements into a computer network. The project has two main parts: research and implementation. Each part ...
    • The Cyber Security of Automated Environmental Measurements 

      Rasmus, Kai (2020)
      Online automatic measurements are a way of doing cost effective environmental monitoring. The systems consist of a network of remote measurement stations connected to a central dissemination service via some form of backbone ...
    • The Human Element in IT Security 

      Malinen, Leo Mikael (2021)
      This research is focused on the topic of IT security from the perspective of the internal human element by examining employee’s roles in organization’s IT security. This is achieved by examining how big the role of the ...
    • The impact of COVID-19 pandemic on User Experience Design of Digital Platforms 

      Narciso Moreira, Inna (2021)
      The thesis work is aimed to research the changes in User Experience on Digital Platforms (DP) as a result of the pandemic of Covid-19. The global situation forced the shift into an online reality. Consumerism as we knew ...
    • The modern cloud governance model : roles and responsibilities in the cloud centre of excellence function 

      Kankola, Janne (2022)
      Many organisations are going through a cloud transformation and moving their workloads into a public cloud. These organisations need a clearer vision of how cloud environment methodologies differ from on-premise environments ...
    • The role of cybersecurity education on ethical hacking 

      Marat, Cynthia; Marat, Stephane (2024)
      Cybersecurity emerges with a prime focus on the fortification of information systems from theft or damage to software or hardware. In the digital age, the advent of technology has contributed substantially to the revolution ...
    • The safeguarding of the consumer in electronic commerce : Comparison analysis between Morocco and Finland 

      Zbadi, Mohamed (2023)
      I decided in this thesis to examine the safeguarding of consumers in the context of e-commerce, specifically focusing on a comparative analysis of the Moroccan and Finnish legislations. Since I studied business law in my ...
    • The use of RFID technology in the patient tracking system 

      Nuuri, Aminullah (2022)
      RFID has been deployed in a variety of sectors, including healthcare, however the acceptance and usage of RFID remain a concern. Despite its promise to increase healthcare provider efficiency and patient safety, there are ...
    • The viability of blockchains 

      Palop Gisbert, Joan Sebastià (2022)
      Blockchains are a new technology that has risen to a worldwide knowledge level in the past few years, and they have been anything but polarizing. A large group is defending them, praising their capabilities, and talking ...
    • Thingsboard API Gateway for the Savonia WaterLAB 

      Agyekum, Kofi (2023)
      The development and deployment of Application Programming Interfaces (APIs) has become increasingly important in the modern software environment. APIs serves as intermediaries between applications, enabling seamless ...
    • User data and privacy protection 

      Mereu, Roberto (2020)
      Private information is any piece of information related to an identifiable living person or individual. Throughout the years, privacy laws were created to protect the privacy of people and lately, their private data as ...
    • Using AWS Secrets Manager with Kubernetes 

      Jurvanen, Karl-Juhan (2021)
      Nykyaikaisissa ohjelmistoissa on useimmiten joitakin salassa pidettäviä tietoja, kuten salausavaimia ja käyttäjien tunnistetietoja. Näiden salaisuuksien turvallinen säilytys ja käsittely ovat tärkeä osa ohjelmiston ...
    • Using Blockchain To Fight Against Counterfeit Medicine 

      Mollik, Mohammod Arafat (2021)
      Counterfeit drugs have become a global threat that recently have drawn significant attention. Estimated by WHO, more than a million people die because of using fake drugs. If we dig through the reasons behind counterfeit ...
    • Utilization of Cloud Services in a Hybrid Environment 

      Tiikkainen, Mikko (2023)
      The thesis was done as an insurance company's IT environment development project. Various authorities closely monitor the operations of the insurance company. These things should also be considered when developing and ...