Theseus - Selaus asiasanan mukaan "cyber security"
Viitteet 221-240 / 243
-
The computer network security implementation in an enterprise project
(2021)The main purpose of this thesis is to investigate existing information security technologies and implement these elements into a computer network. The project has two main parts: research and implementation. Each part ... -
The Concept of the Cyber Security in an office
(2020)Tutkimuksen tavoitteena oli selvittää yrityksen toimiston henkilöstöltä, mitä he ajattelevat kyberturvallisuuden olevan? Jatkokysymyksillä laajennettiin tietoisuutta henkilöstön näkemyksestä kyberturvallisuuteen liittyviin ... -
The Cyber Security of Automated Environmental Measurements
(2020)Online automatic measurements are a way of doing cost effective environmental monitoring. The systems consist of a network of remote measurement stations connected to a central dissemination service via some form of backbone ... -
The Data Transmission Network Project of The Production Process Control System
(2024)This project presents a data transmission network design for a production process control system. Currently, Ethernet-type networks hold the top place when it comes to building production line networks. However, this work ... -
The Evolution of Mobile Malware
(2024)From the discovery of the first mobile malware in 2004 to the advanced variants encountered in 2024, this thesis explores how mobile malware has evolved in parallel with the development of mobile devices. The research is ... -
The Human Element in IT Security
(2021)This research is focused on the topic of IT security from the perspective of the internal human element by examining employee’s roles in organization’s IT security. This is achieved by examining how big the role of the ... -
The impact of digital technologies on international business practices
(2024)Digital technology has allowed organizations to increase their product and service reach internationally. Businesses can seize the opportunity to enhance operational efficiency and acquire a competitive edge on a global ... -
The Operative Level Perception of Cyber crime (Threats and Prevention ) in a Logistic Company
(2021)The Thesis work has explored the effects of cybercrime and their motives behind the actions of the hackers for taking such an act, in disrupting companies services, networks, and most obviously, the financial consequences ... -
The role of cybersecurity education on ethical hacking
(2024)Cybersecurity emerges with a prime focus on the fortification of information systems from theft or damage to software or hardware. In the digital age, the advent of technology has contributed substantially to the revolution ... -
The role of security patch management in vulnerability management
(2021)The thesis was commissioned by a global IT and business consulting services firm, referred to as the commissioner in the report. The objective was to understand the role of security patch management in the vulnerability ... -
Threat Detection Gap Analysis Using MITRE ATT&CK Framework
(2022)The volume and impact of security incidents against organizations are increasing globally. Each organization needs to understand what assets they are defending and what detection tools they have in place to detect future ... -
Threat modelling of cyber-physical threats: methodology for assessing threats associated with cyber-physical boundaries in systems
(2024)Kyber-fyysisten järjestelmien (CPS) uhkamallinnus on laajasti tutkittu aihe. Vaikka useita perinteisiä ja moderneja viitekehyksiä on käytetty tehtävässä menestyksekkäästi, kyber-fyysisiä järjestelmiä hyödyntävien ... -
TIBER-EU Preparation Phase Framework; case study Nixu: optimizing TIBER-EU engagements
(2023)TIBER-EU on toimialakohtainen uhkatietoihin perustuva hyökkäävän tietoturvatestauksen toimintamalli eurooppalaisen finanssialan kriittisen infrastruktuurin toimijoille. TIBER-EU -toimintamallin tarkoitus on vakioida ja ... -
Utilizing GitHub's Built-in Security Features and GitHub Actions to Automate SAST and Deployment for EJS Web Applications
(2023)This thesis explores GitHub's security features and GitHub Actions for automating Static Application Security Testing (SAST) processes and Embedded JavaScript (EJS) web application deployment. It addresses research questions ... -
Venäjän hyökkäys Ukrainaan ja sen vaikutus Suomen kyberturvallisuuteen
(2023)Opinnäytetyön tarkoituksena oli selvittää, miten helmikuussa 2022 alkanut Venäjän sotilaallinen hyökkäys Ukrainaa kohtaan on vaikuttanut Suomen kyberturvallisuuden tilaan. Opinnäytetyö rajattiin tuottamaan tietoa siitä, ... -
Vulnerability management for technical vulnerabilities
(2024)Opinnäytetyössä tutkittiin energia- ja kaukolämpösektorin yrityksen IT-järjestelmien haavoittuvuudenhallintaprosessia. Haavoittuvuudenhallinta on keskeinen osa toimeksiantajan tietoturvariskien hallintaa. Opinnäytetyön ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Vulnerability Management Process
(2022)Alati kasva kyberuhkien määrä asettaa haasteita myös organisaatioille. Haavoittuvuuksia löytyy yhä enenevissä määrin ja kyberrikolliset hyödyntävät niitä aktiivisesti. Jotta haavoittuvuuksiin voidaan reagoida tehokkaasti ... -
What is a ransomware and how does it work?
(2023)The purpose of this bachelor’s thesis was to create an educational guide about ransomware for organizations as well as other individuals, which raises awareness in defending against ransomware attacks. In this thesis a ... -
What is Zero Trust: and How Can It Be Implemented?
(2022)In this thesis I write about Zero Trust and how it can be implemented. The purpose for that is to be more knowledgeable within IAM and explain why in today's IT it is no longer as safe to use standard user credentials for ... -
White Hat hacking : system and application security focusing on its fundamentals, malware and Wi-Fi vulnerability
(2021)No technology, even a modern variant, is completely secure. With cyberattacks occurring daily and growing more sophisticated, this thesis aims to highlight the need for good cyber security. The primary objectives of ...


















