Haku
Viitteet 1-2 / 2
Implementing a Secured Container Workload in the Cloud
(2021)
The objective of this thesis was to research the different security controls to consider when implementing container workloads in the cloud, the current threats affecting container workloads in the cloud, the mitigation ...
Integrating Open Threat Exchange data in a Security Operations Center
(2021)
Third party sources of cyber threat intelligence can be used to identify malicious network traffic in a security operations center (SOC). In this Bachelor's thesis, an open cyber threat intelligence source was integrated ...