Haku
Viitteet 1-10 / 11
Human Factor, Cyber Hygiene, Cyber-Physical Systems, and Industrial Control Systems in the Context of Cybersecurity
(2023)
The purpose of this study was to examine cybersecurity in critical infrastructure, human factors, and cyber hygiene in Cyber-Physical Systems (CPS) and Industrial Control Systems (ICS).
The human factor is widely accepted ...
Xamk cyber range: design of concept for cyber training environment
(2022)
Tämän harjoitustyön tavoitteena oli suunnitella konsepti Kaakkois-Suomen ammattikorkeakoulun (Xamk) virtuaalisesta kyberturvallisuuden harjoitteluympäristöstä. Kyberharjoitteluympäristön konsepti on tarkoitus toteuttaa ...
DevSecOps adoption: Improving visibility in application security
(2022)
For organizations to be able to build digital products that are as secure as possible for their customers, security must be implemented in every phase of the software development life cycle. Good application security ...
Cybersecurity in Internet of Medical Things. Risks and Challenges.
(2021)
Earlier studies have found that cybersecurity in IoMT is still in the learning process for healthcare organizations. The participants seemed not to understand what their organization's management has been doing to contain ...
Implementing a Secured Container Workload in the Cloud
(2021)
The objective of this thesis was to research the different security controls to consider when implementing container workloads in the cloud, the current threats affecting container workloads in the cloud, the mitigation ...
The role of security patch management in vulnerability management
(2021)
The thesis was commissioned by a global IT and business consulting services firm, referred to as the commissioner in the report. The objective was to understand the role of security patch management in the vulnerability ...
5G core network slicing : MEC and NEF security concerns while exposing the 5G core for 3rd parties
(2021)
The objective of the thesis was to discover 5G core network architecture readiness to provide network slicing service. The 5G core slicing is the base service to support mobile edge computing (MEC) in the 5G network. In ...
Secure Cloud Implementation in Governmental Organisations
(2020)
This research studied the basic security-related principles in generalised manner that need evaluating when governmental organisations plan to implement cloud computing as a part of their operations. The main objectives ...
Cybersecurity evaluation of IoT systems
(2020)
As the amount of devices connected to Internet is increasing on a daily basis, the need for
cybersecurity is now higher than ever and not only the personal computer and server but
also Internet-of-things or IoT devices ...
Improving Cyber Security Situational Awareness with Log and Network Security Monitoring
(2020)
The objective of this thesis was to study the current best practices of technical information
security monitoring regarding mission-critical environments. In addition, information outside
best practices was sought to ...