Theseus - Selaus asiasanan mukaan "cyber crime"
Viitteet 1-7 / 7
-
Analysing and protecting against existing cyber attacks
(2019)Too often, companies tend to underestimate the importance of cyber security. Either too expensive or too complicated, cyber security measures are sometimes overlooked and some systems reveal to be openly vulnerable to any ... -
Automating vulnerability assessment tools and procedures: Security audit solution for small organizations
(2021)Yhteiskunnan ripeä digitalisoituminen on muuttanut päivittäistä elämäämme huomattavasti viimeisten vuosikymmenten aikana. Teknologian kehittyessä päivittäiset tehtävämme siirtyvät enenevässä määrin digitaaliseen muotoon. ... -
CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY
(2022)The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ... -
Guidelines and tools for a digital evidence investigation process : a case study for a business data leak
(2020)The objective of this thesis was to provide a suitable and admissible analytical framework for a digital forensic analysis carried out by an investigator. In this thesis these concepts are explained in-depth to provide ... -
Investigation into cybercrime trends
(2021)This thesis investigates current developments in cybercrime in regard to several key areas. As the entire field of cybercrime is vast, this thesis focuses its analysis on the current development in ransomware, cybercrime ... -
Performing remote live response on organizational environment
(2020)With the digitalization of society, the traditional crimes have manifested in digital operational environment in cybercrimes, which have created a need for organizations to build a lasting ability to detect and respond to ... -
The Operative Level Perception of Cyber crime (Threats and Prevention ) in a Logistic Company
(2021)The Thesis work has explored the effects of cybercrime and their motives behind the actions of the hackers for taking such an act, in disrupting companies services, networks, and most obviously, the financial consequences ...






