Theseus - Selaus asiasanan mukaan "cyber attacks"
Viitteet 1-20 / 67
-
Analysing and protecting against existing cyber attacks
(2019)Too often, companies tend to underestimate the importance of cyber security. Either too expensive or too complicated, cyber security measures are sometimes overlooked and some systems reveal to be openly vulnerable to any ... -
ANALYSIS OF CORPORATE CYBER INCIDENTS, VULNERABILITIES, THEIR MITIGATION, AND SOLUTION METHODS
(2023)This project aimed to conduct a comprehensive analysis of the company's network by identifying vulnerabilities and weaknesses that could be exploited by cybercriminals. To accomplish this, a virtual network was created ... -
Artificial Intelligence in Cyber Security
(2022)The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human analysis and confronted every new type of cyber danger. With the growing digital footprint, a substantial number of personal ... -
Attracting the APT actors into deception system: identifying ways to attract an APT actor
(2024)Improving situational awareness is an emerging trend in the field of information security. The organisation’s must identify the proper technical data sources and the non-technical cyber threat intelligence sources in the ... -
Automating vulnerability assessment tools and procedures: Security audit solution for small organizations
(2021)Yhteiskunnan ripeä digitalisoituminen on muuttanut päivittäistä elämäämme huomattavasti viimeisten vuosikymmenten aikana. Teknologian kehittyessä päivittäiset tehtävämme siirtyvät enenevässä määrin digitaaliseen muotoon. ... -
Capabilities and Use of Cortex as part of the DYNAMO project
(2022)According to the 2022 Cyber Threat Report from SonicWall, the volume of ransomware attacks in 2021 grew by 105% from 2020 and was multiplied by three compared to 2019. This alarming signal demonstrates the need for more ... -
Cloud Security Posture Management /CSPM) in Azure
(2021)Cloud computing is highly vulnerable to cyberattacks and threats due to inadequate change control, misconfiguration, and numerous vendors that utilize distinct strategies and policies with inadequacies for securing cloud-based ... -
Cloud-Enhanced Intrusion Detection : Evaluating Deep Learning and Ensemble Methods Using Hikari 2021 Dataset
(2024)The thesis provides an in-depth analysis into machine learning and deep learning system methodologies for network invasion discovery using the HIKARI-2021 dataset. This involved the application of models like Random Forest, ... -
Contribution of Open-Source Intelligence to Social Engineering Cyberattacks
(2022)The majority of cyberattacks occur without the need to break into IT systems. Attackers use psychological methods and exploit readily accessible information to manipulate their targets into making irrational decisions. The ... -
Creating Labs for Ethical Hacking Course Based on WiFi Pineapple and USB Rubber Ducky
(2024)As technology evolves and cyberattacks increase, cybersecurity education is more crucial than ever. Ethical hacking, or penetration testing, plays a vital role in safeguarding networks by proactively identifying vulnerabilities. ... -
CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY
(2022)The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ... -
Cyber Incident Response in Public Cloud: implications of modern cloud computing characteristics for cyber incident response
(2023)Modern cloud computing has fundamentally changed how IT-resources are consumed by organizations and end-users. The cloud is also defined by some of its key characteristics: on-demand self-service, broad network access, ... -
Cyber Security Framework for NAPA Onboard Products
(2021)NAPA as a maritime software and system provider needs to ensure proven cyber security capabilities before, during and after a system delivery to a ship. Ship owners need to select a classification society for each ship, ... -
Cyber security in customer support: needs analysis and training outline
(2024)The subject of this thesis project was the needs analysis and outline for cyber security awareness training in a customer support department. The client was a company working in the mobility sector. The first part of ... -
Cyber Security Intelligence News Aggregation and Threat Analysis
(2022)Opinnäytetyön tavoitteena on tutkia, kehittää ja arvioida, kuinka uutiskoostajapalvelu Feedlyn avulla voitaisiin rikastaa Wärtsilän kyberuhkatiedustelun raportointia ja muodostaa uhkatiedustelun kanavointi. Tämä ... -
Cyber Security of Highly Automated Connected Machines
(2021)Tietojärjestelmien nopea integrointi ja yhteenliittyminen luo uusia kyberturvallisuuteen liittyviä uhkia tietojärjestelmille ympäri maailmaa. Nykyään nämä uhkaskenaariot ovat läsnä myös eri toimialojen liikkuvissa ... -
Cyber Warfare: A Part of the Russo-Ukrainian War in 2022
(2022)On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first-time cyber warfare capabilities are used as part of modern warfare. During this war around 800 cyber-attacks have been ... -
Cybersecurity attitudes of computer users
(2022)With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the most talked-about issues in the current digital world. Cybersecurity crimes cause substantial costs on a global scale. The ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Cybersecurity awareness in Somalia
(2021)Cybersecurity awareness is a crucial component for maintaining a healthy cybersecurity state. Somalia is a developing nation with a fragile cybersecurity sector due to various issues, including lacking an official national ... -
Cybersecurity development and business continuity plan for car dealership
(2022)The purpose of this thesis was to investigate the capability of the case company to meet the challenges of current and growing security threats and to come up with a development plan to increase the level of cyber security ...


















