Theseus - Selaus nimekkeen mukaan

Viitteet 30778-30797 / 289953

    • Cyberattacks on critical infrastructure and corresponding countermeasures 

      Vähäkainu, Petri (2023)
      These days cyberattacks pose a growing risk to cyber-physical systems (CPSs) that act as a part of critical infrastructure (CI) that are vital to a nation’s economy and security. These attacks can disrupt vital devices and ...
    • Cybercrime, law and technology in Finland and beyond 

      Calcara, Giulio; Sund, Peter; Tolvanen, Matti
      Reports of the Police University College of Finland =Poliisiammattikorkeakoulun raportteja (Police University College of Finland, 2019)
    • Cybergame firewall design and implementation 

      Hakkarainen, Asko (Kaakkois-Suomen ammattikorkeakoulu, 2017)
      The purpose of this Bachelor's thesis was to design and implement redundant, North-South -firewall system into Cybergame project. The need for the firewall system is to route and permit/deny traffic inside Cybergame network ...
    • Cybergame Platform Administrative User Access Management 

      Litreev, Aleksandr (Kymenlaakson ammattikorkeakoulu, 2016)
      The main objective of this bachelor thesis is a research of feasibility of establishing an intermediate service authorization for an isolated special ICTLAB Cybergame project environment. Created interim authorization ...
    • Cybergame secure application delivery 

      Järviö, Juuso (Kaakkois-Suomen ammattikorkeakoulu, 2017)
      The aim of this project was to create a ready framework for a web application called Cybergame by implementing secure and optimized application delivery features. The application was not ready at the time of the project, ...
    • Cybergame virtualization and storage cluster design 

      Leppänen, Samu (Kaakkois-Suomen ammattikorkeakoulu, 2017)
      The main goal of this bachelor’s thesis was to design and implement a virtualization environment for the “Cybersecurity Expertise and Business Development” project using VMware vSphere products. The environment had to be ...
    • Cyberith Virtualizer -liikealustan hyödyntäminen virtuaalitodellisuudessa 

      Anttonen, Veli-Pekka (2019)
      Opinnäytetyössä tutustuttiin Cyberith Virtualizer -liikealustan toimintaan ja hyödyntämiseen virtuaali-todellisuudessa. Työn tilaaja halusi lisää tietoa kyseisen laitteen toimintatavasta, sovellusten kehittä-misestä ...
    • CyberKnife -tarkkuussädehoito : potilasesite 

      Rantanen, Johannes; Hyttinen, Sari; Heiskanen, Timo (Savonia-ammattikorkeakoulu, 2014)
      Vuonna 2012 Kuopion yliopistollisen sairaalan sädehoitoyksikössä otettiin käyttöön CyberKnife-tarkkuussädehoitolaite. Opinnäytetyön aihe perustuu laitteen käyttöönoton myötä esiin nousseeseen tarpeeseen. Kuopion yliopistollisessa ...
    • CyberKnife : kirjallisuuskatsaus sädehoitolaitteesta ja sen käyttökohteista syövän ja muiden sairauksien hoidossa 

      Sormunen, Santtu; Laaksoranta, Eero-Pekka (Savonia-ammattikorkeakoulu, 2013)
      Uusia syöpien hoitolaitteita ja -menetelmiä kehitetään koko ajan. Suomeen saatiin vuonna 2012 Pohjoismaiden ensimmäinen CyberKnife-hoitolaite. Tästä laitteesta ei ole vielä tehty kattavaa suomenkielistä kirjallisuuskatsausta. ...
    • Cybersecurity : Secure code with code auditing 

      Thapa, Bishal (2023)
      The purpose of the thesis was to illuminate the factors related to cyber security focusing on secure coding with code auditing process. These factors included the risk and vulnerabilities in the software, how the vulnerabilities ...
    • Cybersecurity attitudes of computer users 

      Fuchs, Radovan (2022)
      With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the most talked-about issues in the current digital world. Cybersecurity crimes cause substantial costs on a global scale. The ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • Cybersecurity awareness in Somalia 

      Nur, Abas Osman (2021)
      Cybersecurity awareness is a crucial component for maintaining a healthy cybersecurity state. Somalia is a developing nation with a fragile cybersecurity sector due to various issues, including lacking an official national ...
    • Cybersecurity development and business continuity plan for car dealership 

      Valasvuo, Santeri (2022)
      The purpose of this thesis was to investigate the capability of the case company to meet the challenges of current and growing security threats and to come up with a development plan to increase the level of cyber security ...
    • Cybersecurity evaluation of IoT systems 

      Sjölund, Johan (2020)
      As the amount of devices connected to Internet is increasing on a daily basis, the need for cybersecurity is now higher than ever and not only the personal computer and server but also Internet-of-things or IoT devices ...
    • Cybersecurity in Agricultural Communication Networks : Case Dairy Farms 

      Manninen, Onni (Jyväskylän ammattikorkeakoulu, 2018)
      Agricultural industry in Finland has used modern computing since the late 1950s, however, in the last decade digitalization in the industry has started to grow like never before. There is little public conversation about ...
    • Cybersecurity in bank: a case on employee engagement and responsibility for a Secure Digital Environment (SDE) in the selected branch 

      Hasan, Md Tareq (2023)
      With the escalation of digital interconnectedness, cybersecurity is at the core of many sectors, including banking. Ensuring a Secure Digital Environment (SDE) requires not just robust technology but also engaged and ...
    • Cybersecurity in Internet of Medical Things. Risks and Challenges. 

      Vosikas, Ioannis (2021)
      Earlier studies have found that cybersecurity in IoMT is still in the learning process for healthcare organizations. The participants seemed not to understand what their organization's management has been doing to contain ...
    • Cybersecurity in OT Environments : A Modular Approach for Network Integrity 

      Luttinen, Timo (2023)
      The rapid evolution of cyber threats in network environments necessitates advanced and adaptable security strategies. This thesis presents the design and implementation of a comprehensive system, designed for Rejlers ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • Cybersecurity in SCADA Engineering 

      Hurttila, Antti (2019)
      Kyberturvallisuus on kasvava huolenaihe valvontaohjelmistoalalla. Monilla yrityksillä tietoturvan tuominen osaksi järjestelmän kehitystyötä on ongelmallista. Opinnäytetyön tarkoitus oli määrittää, dokumentoida ja tuoda ...