"cyber security" - Selaus asiasanan mukaan Opinnäytetyöt
Viitteet 1-20 / 28
-
5G core network slicing : MEC and NEF security concerns while exposing the 5G core for 3rd parties
(2021)The objective of the thesis was to discover 5G core network architecture readiness to provide network slicing service. The 5G core slicing is the base service to support mobile edge computing (MEC) in the 5G network. In ... -
ANALYSIS OF CORPORATE CYBER INCIDENTS, VULNERABILITIES, THEIR MITIGATION, AND SOLUTION METHODS
(2023)This project aimed to conduct a comprehensive analysis of the company's network by identifying vulnerabilities and weaknesses that could be exploited by cybercriminals. To accomplish this, a virtual network was created ... -
CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY
(2022)The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ... -
Cybersecurity evaluation of IoT systems
(2020)As the amount of devices connected to Internet is increasing on a daily basis, the need for cybersecurity is now higher than ever and not only the personal computer and server but also Internet-of-things or IoT devices ... -
Cybersecurity in Internet of Medical Things. Risks and Challenges.
(2021)Earlier studies have found that cybersecurity in IoMT is still in the learning process for healthcare organizations. The participants seemed not to understand what their organization's management has been doing to contain ... -
DEMONSTRATE EXPLOIT AIMING AT WINDOWS (ACTIVE DIRECTORY) AND WEB APPLICATION
(2024)In today's digital landscape, ensuring the security of critical systems and applica- tions was paramount. Active Directory (AD) and web applications represented two key components within organizational infrastructure, ... -
Design and Implementation of the Automated Hacker for Cybersecurity Courses
(2023)Tämä opinnäytetyö käsittelee kyberturvallisuuden kannalta haavoittuneen verkkopalvelimen ja siihen liitetyn relaatiotietokannan rakentamista, sekä automatisoidun Python koodin luomista, joka hyväksi käyttää kyseisiä ... -
Development of Open-Source SIEM and Security Operation Centre in A Company
(2022)Opinnäytetyön sisällön tarkoituksena on luoda SOC-toiminallisuus sekä SIEM järjestelmä, josta yritetään rakentaa logienhallintajärjestelmää, jonka MPY:llä ei ole vielä sitä käytössä. OSSIMin AlienVault on keskeisessä ... -
DevSecOps adoption: Improving visibility in application security
(2022)For organizations to be able to build digital products that are as secure as possible for their customers, security must be implemented in every phase of the software development life cycle. Good application security ... -
Human Factor, Cyber Hygiene, Cyber-Physical Systems, and Industrial Control Systems in the Context of Cybersecurity
(2023)The purpose of this study was to examine cybersecurity in critical infrastructure, human factors, and cyber hygiene in Cyber-Physical Systems (CPS) and Industrial Control Systems (ICS). The human factor is widely accepted ... -
Implementing a Secured Container Workload in the Cloud
(2021)The objective of this thesis was to research the different security controls to consider when implementing container workloads in the cloud, the current threats affecting container workloads in the cloud, the mitigation ... -
Improving awareness of online browsing behaviours: learning environment for phishing attacks
(2023)It can be challenging to highlight the dangers involved with online browsing from an information security perspective. Following previous research which concluded that providing a more interactive experience aided in raising ... -
Improving Cyber Security Situational Awareness with Log and Network Security Monitoring
(2020)The objective of this thesis was to study the current best practices of technical information security monitoring regarding mission-critical environments. In addition, information outside best practices was sought to ... -
Integrating Open Threat Exchange data in a Security Operations Center
(2021)Third party sources of cyber threat intelligence can be used to identify malicious network traffic in a security operations center (SOC). In this Bachelor's thesis, an open cyber threat intelligence source was integrated ... -
MICROSOFT SENTINEL DEPLOYMENT AND EVALUATION
(2022)This thesis was a research and implementation of Microsoft Sentinel a cloud-based security information event management tool. An opportunity for the thesis work came from a company called Marskidata where Microsoft products ... -
Offensive Security Lab
(2022)The objective of this thesis was to explore the different types of cyber-attack, phases of an attack, and building a lab which could be used to safely conducting a cyber-attack. The end goal was to make offensive ... -
Passive Optical Access Cybersecurity Project of Kaunas University of Applied Sciences Administrative Building
(2023)A cyber security project for passive optical access in the administrative building of Kaunas University of Applied Sciences has been presented, replacing copper networks with faster, more reliable and more efficient networks ... -
Red Teaming : Regulatory and non-regulatory frameworks used in adversarial simulations
(2021)As cyber attacks have started to be more common, organizations have begun to realize that the resilient cyber defense has become a mandatory requirement. This has led multiple institutions to gather up and create various ... -
Risks in the user interaction of alarm functionality in situation awareness systems
(2020)This study aimed to identify how the perception of user alerts is supported by design instructions and standards, examine possible and realized risks associated with losing situational awareness regarding alerts, and report ... -
Role of IAM in an Organization
(2021)Many identities are possessed by the user in this digital world. The access rights and the digital identities requires to be managed and controlled at all levels. Managing the identities and controlling the access rights ...


















