Theseus - Selaus asiasanan mukaan "cyber security"
Viitteet 1-20 / 243
-
5G core network slicing : MEC and NEF security concerns while exposing the 5G core for 3rd parties
(2021)The objective of the thesis was to discover 5G core network architecture readiness to provide network slicing service. The 5G core slicing is the base service to support mobile edge computing (MEC) in the 5G network. In ... -
A design model for a degree programme in cyber security
Proceedings of the 2019 11th International Conference on Education Technology and Computers. ICETC 2019 (Association for Computing Machinery, 2019)The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ... -
A Proof of Concept for an AWS Lambda malicious code generator tool
(2022)Supply chain poisoning is a type of attack where malicious code is inserted into otherwise legitimate software, and with the rise of cloud solutions and services more threat surface is revealed for this attack. The purpose ... -
A Study in Advanced Methods for Website Security: Application of Tor and OWASP Zed Attack Proxy
(2023)The primary purpose of the thesis was to study the application of Information Security by using specific examples of a comparison of two network technologies which were Tor and VPN and a web app testing tool namely OWASP ... -
An Information security audit for a Finnish paper mill
(2021)The purpose of this thesis project was to conduct an IT security audit on a paper mill’s office systems. This was carried out with a partner company that provides information technology solutions and services. The goal for ... -
Analysing and protecting against existing cyber attacks
(2019)Too often, companies tend to underestimate the importance of cyber security. Either too expensive or too complicated, cyber security measures are sometimes overlooked and some systems reveal to be openly vulnerable to any ... -
Analysing Cybersecurity Education in Degree Programmes of Finnish Universities
(2021)Since 2019, Finland’s Cyber Security Strategy has set a goal of strengthening education of cyber and information security, software and application development, information networks and telecommunications. The purpose of ... -
Analysis of a Wärtsilä power plant control system network layout
(2022)This thesis work is based on writing a document on how Wärtsilä's power plant automation layout works. The document contains how the automation components are connected and what standards and communication protocol Wärtsilä ... -
ANALYSIS OF CORPORATE CYBER INCIDENTS, VULNERABILITIES, THEIR MITIGATION, AND SOLUTION METHODS
(2023)This project aimed to conduct a comprehensive analysis of the company's network by identifying vulnerabilities and weaknesses that could be exploited by cybercriminals. To accomplish this, a virtual network was created ... -
Analysis of E-skills Found in Job Postings
(2022)The purpose of this thesis is to find out what kind of e-skills are being sought in the United Kingdom’s labour market. The thesis examines job postings from various fields, such as cyber security, the IT sector, and fields ... -
Analysis of malware - the Morris Worm
(2019)It has always been necessary to secure your personal information. This has become all the more necessary since the Internet has become obsolete as people have begun to steal these and other data through the internet or by ... -
Analysis of Modern Malware: obfuscation techniques
(2023)Uhkatoimijat käyttävät haittaohjelmia yksilöiden ja yritysten vahingoittamiseen. Haittaohjelmat ovat suosituin kyberhyökkäysmuoto monipuolisuutensa ansiosta. Kyberhyökkäys voi vaihdella yksinkertaisesta viruksesta ... -
Applying onboarding theory on the security champion program
(2022)As the technology evolves and societies are more and more using different cloud SaaS (Software as a Service) through the Internet. At the same time cyber domain has evolved too and the amount of malicious activity has risen ... -
Artificial Intelligence in Cyber Security
(2022)The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human analysis and confronted every new type of cyber danger. With the growing digital footprint, a substantial number of personal ... -
Assessing cyber security education through NICE cybersecurity workforce framework
ICETC: International Conference on Education Technology and Computers (2020)This paper presents the results of research and assessment of cyber security education in higher education in Europe and the United States of America. The quantitative research data of the education curricula was gathered ... -
Attracting the APT actors into deception system: identifying ways to attract an APT actor
(2024)Improving situational awareness is an emerging trend in the field of information security. The organisation’s must identify the proper technical data sources and the non-technical cyber threat intelligence sources in the ... -
Authentication in Web Applications
(2023)The goal of this thesis is to explore web service authentication methods in the context of modern web applications. As web services continue to be integral components of today's digital landscape, the need for simple but ... -
Automated hardening of Linux infrastructure
(2023)Automatisoitu työasemien, palvelimien ja sovellusten koventaminen on välttämätöntä suurissa korkean turvallisuustason ympäristöissä. Microsoft Windows -toimialueessa automaatio voidaan toteuttaa ryhmäkäytänteillä. ... -
Automated Security Testing Utilizing Continuous Integration and Continuous Delivery Technologies
(2021)The circumstances of the year 2020 created a need for pushing everything and everyone online. To adapt to the situation at the required pace, the swift transition of existing systems and workflows from physical to digital ... -
Automated Security Testing Utilizing Continuous Integration and Continuous Delivery Technologies
(2021)The circumstances of the year 2020 created a need for pushing everything and everyone online. To adapt to the situation at the required pace, the swift transition of existing systems and workflows from physical to digital ...



















