Theseus - Selaus asiasanan mukaan "malware"

    • A Practical Approach to Malware Exploration : Setting up a Dedicated Analysis Lab 

      Franko, Alex (2024)
      The objective of this study was to design and implement a virtual lab environment for malware analysis. The core of this work involved the construction of a primary Windows VM for main analysis tasks and a secondary Linux ...
    • Analysis of malware - the Morris Worm 

      Kraken, Johanna (2019)
      It has always been necessary to secure your personal information. This has become all the more necessary since the Internet has become obsolete as people have begun to steal these and other data through the internet or by ...
    • Analysis of Modern Malware: obfuscation techniques 

      Luoma-aho, Mika (2023)
      Uhkatoimijat käyttävät haittaohjelmia yksilöiden ja yritysten vahingoittamiseen. Haittaohjelmat ovat suosituin kyberhyökkäysmuoto monipuolisuutensa ansiosta. Kyberhyökkäys voi vaihdella yksinkertaisesta viruksesta ...
    • Android Malware Analysis 

      Trieu, Tho (2021)
      The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. Android platform is the most used operating system on mobile phones in the market share. Similar to Windows – most operating ...
    • Applications of Machine Learning for Malware and Intrusions Detection 

      Ghimire, Nabaraj (2024)
      Computers face numerous security threats like spoofing, jamming, DDoS attacks, malware, and botnet attacks. Various machine learning techniques and algorithms can be employed to enhance the security features of computing ...
    • Designing and Implementing a Secure Reverse-Engineering Environment for Windows-based Malware 

      Yli-Lankoski, Jarkko (2024)
      The act of analysing and reverse-engineering malware requires an environment which is both secure and effective in versatile analysis cases. While the amount of malware has rapidly increased, the skills to analyse suspect ...
    • Information security incident analysis in Finland : based on pseudonymized open data published by the Finnish Transport and Communications Agency 

      Kiuru, Mikko (2024)
      Organisaatioiden tilannetietoisuus tietoturvatapahtumien osalta on ajankohtaisempaa kuin koskaan. Suomessa Liikenne- ja viestintävirasto Traficom julkaisee suomalaisten palveluntarjoajien verkoissa havaittuja tietoturvatapahtumia ...
    • Investigation into cybercrime trends 

      Koivula, Elias Matinpoika (2021)
      This thesis investigates current developments in cybercrime in regard to several key areas. As the entire field of cybercrime is vast, this thesis focuses its analysis on the current development in ransomware, cybercrime ...
    • Malware Analysis for ARM-based Unix-like Systems 

      Timoshchenko, Danila (2024)
      The goal of this thesis was to assess the current state of malware, developed and recompiled for ARM-based Linux and MacOS systems. In the thesis, the threat of malware for newer ARM-based systems is reviewed for both ...
    • Malware Detection Using Machine Learning 

      Trung, Nguyen (2024)
      In our increasingly digital world, the threat of malware is a growing concern for all internet users. Traditional methods of detecting malware are becoming less effective as cyber threats become more sophisticated, ...
    • Offensive Security Lab 

      Duc, Nguyen (2022)
      The objective of this thesis was to explore the different types of cyber-attack, phases of an attack, and building a lab which could be used to safely conducting a cyber-attack. The end goal was to make offensive ...
    • The Evolution of Mobile Malware 

      Reijonen, Arttu (2024)
      From the discovery of the first mobile malware in 2004 to the advanced variants encountered in 2024, this thesis explores how mobile malware has evolved in parallel with the development of mobile devices. The research is ...
    • The Operative Level Perception of Cyber crime (Threats and Prevention ) in a Logistic Company 

      Odhomi, Elohor Eddy (2021)
      The Thesis work has explored the effects of cybercrime and their motives behind the actions of the hackers for taking such an act, in disrupting companies services, networks, and most obviously, the financial consequences ...
    • What is a ransomware and how does it work? 

      Lamsouber, Luca (2023)
      The purpose of this bachelor’s thesis was to create an educational guide about ransomware for organizations as well as other individuals, which raises awareness in defending against ransomware attacks. In this thesis a ...
    • White Hat hacking : system and application security focusing on its fundamentals, malware and Wi-Fi vulnerability 

      Tuunainen, Toni (2021)
      No technology, even a modern variant, is completely secure. With cyberattacks occurring daily and growing more sophisticated, this thesis aims to highlight the need for good cyber security. The primary objectives of ...