"data security" - Selaus asiasanan mukaan Kaakkois-Suomen ammattikorkeakoulu
Viitteet 1-18 / 18
-
Achieving privacy and ISO 27001 standard
(2023)This thesis describes the main requirements related to privacy within the EU and compliance variants with an emphasis on technologies. The second part of the thesis is describing how organizations can comply with the ... -
ANALYSIS OF CORPORATE CYBER INCIDENTS, VULNERABILITIES, THEIR MITIGATION, AND SOLUTION METHODS
(2023)This project aimed to conduct a comprehensive analysis of the company's network by identifying vulnerabilities and weaknesses that could be exploited by cybercriminals. To accomplish this, a virtual network was created ... -
Computer Network Modernization
(2024)This thesis presents a comprehensive modernization of a network infrastructure, merging extensive theoretical exploration with practical application. It begins by establishing a detailed theoretical framework that elucidates ... -
CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY
(2022)The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ... -
DEMONSTRATE EXPLOIT AIMING AT WINDOWS (ACTIVE DIRECTORY) AND WEB APPLICATION
(2024)In today's digital landscape, ensuring the security of critical systems and applica- tions was paramount. Active Directory (AD) and web applications represented two key components within organizational infrastructure, ... -
Development of Open-Source SIEM and Security Operation Centre in A Company
(2022)Opinnäytetyön sisällön tarkoituksena on luoda SOC-toiminallisuus sekä SIEM järjestelmä, josta yritetään rakentaa logienhallintajärjestelmää, jonka MPY:llä ei ole vielä sitä käytössä. OSSIMin AlienVault on keskeisessä ... -
DevSecOps adoption: Improving visibility in application security
(2022)For organizations to be able to build digital products that are as secure as possible for their customers, security must be implemented in every phase of the software development life cycle. Good application security ... -
Improving awareness of online browsing behaviours: learning environment for phishing attacks
(2023)It can be challenging to highlight the dangers involved with online browsing from an information security perspective. Following previous research which concluded that providing a more interactive experience aided in raising ... -
IoT Productivity Versus Cybersecurity. Is the risk worth it?
Xamk Kehittää 151 (South-Eastern Finland University of Applied Sciences, 2021)As the adoption of IoT devices increases rapidly in modern society, so does the risk of cybersecurity threats and dangers. This desk study is the second part of the series concerning the Internet of Things (IoT) devices ... -
Maritime cybersecurity. Before the risks turn into attacks
Xamk Tutkii 18 (South-Eastern Finland University of Applied Sciences, 2021)Cyber-attacks have increased during the CoVID-19 pandemic. There is an urgent need to understand the threats posed by cyber-attacks and identify how to minimise the potential risks. This study provides best practices to ... -
Messenger development for iOS
(2021)The main goal of this thesis was to study the modern messenger applications principles and secure data transmission algorithms for creation of the own app for iOS platform. There were also studied tools for iOS programming ... -
MICROSOFT SENTINEL DEPLOYMENT AND EVALUATION
(2022)This thesis was a research and implementation of Microsoft Sentinel a cloud-based security information event management tool. An opportunity for the thesis work came from a company called Marskidata where Microsoft products ... -
MODERNIZATION OF COMPUTER NETWORK IN A COMPANY
(2023)The aim of the thesis was to prepare a project for the modernisation of the computer network in a company, the project also includes the implementation of a video surveillance system. Upgrading of the company's IT ... -
Role of IAM in an Organization
(2021)Many identities are possessed by the user in this digital world. The access rights and the digital identities requires to be managed and controlled at all levels. Managing the identities and controlling the access rights ... -
Smart authentication and authorization system
(2021)The main goal of this thesis is to create a smart security system that will reduce the risk of hacking and theft using Internet of Things (IoT) technology. During the project, a prototype system was designed that will use ... -
Technology in FinTech - How Trends Shape Finance
(2021)The finance and banking industry has been reshaped due to the new digitalization trends. FinTech becomes a common concept in the finance field, representing outstanding innovations taken by organizations engaged in ... -
The computer network security implementation in an enterprise project
(2021)The main purpose of this thesis is to investigate existing information security technologies and implement these elements into a computer network. The project has two main parts: research and implementation. Each part ... -
Xamk cyber range: design of concept for cyber training environment
(2022)Tämän harjoitustyön tavoitteena oli suunnitella konsepti Kaakkois-Suomen ammattikorkeakoulun (Xamk) virtuaalisesta kyberturvallisuuden harjoitteluympäristöstä. Kyberharjoitteluympäristön konsepti on tarkoitus toteuttaa ...

















