Haku
Viitteet 1-10 / 179
Security assessment of databases
(2020)
Database security is playing an increasingly central role in organizations today. Databases contain the most important and sensitive data. In this research, a security assessment of several different databases for a public ...
Improving Information Security in Healthcare Networks With Software-Defined Networking
(2020)
Monet nykypäivän tietoverkot ovat seurausta 1970-luvulla tehdyistä verkkojen ja protokollien suunnittelupäätöksistä. Tietoverkkojen vaatimukset ovat kehittyneet nopeammin kuin niihin liittyvät tekniikat ja toiminnot. ...
Distributed Microservice Tracing Systems : Open-source tracing implementation for distributed Microservices build in Spring framework
(2020)
Monolithic service architectures for enterprise and large backend applications are becoming rare. The monoliths are being replaced with distributed microservice architectures, where the backend application is distributed ...
Automated ICT system health monitoring using Grafana
(2020)
Futures Platform is a consultation company which provides foresights solutions and a tool to visualize all different possible solutions related to foresight.
As the technology evolve and ICT developments becomes more ...
Employee Profiles in Automated Access Management
(2020)
Employee profiles in automated access management is an interesting topic because it is about defining what access rights a group of employees needs to do their work. Then letting a script grant or remove the rights. Unlike ...
Real-Time Masked Face Recognition Using Machine Learning
(2020)
An enormous number of robust face recognition systems has been around to help authorities and commercial companies to recognize people. While these systems work very well, a new problem came from nowhere that forced people ...
Epäsuorien hankintojen kehittäminen
(2019)
Opinnäytetyön keskeisenä tavoitteena oli epäsuorien hankintojen kehittäminen ja modernien digitaalisten hankintatyökalujen hyödyntäminen. Nykytilan kartoituksen, sekä toimenpidesuunnitelmien lisäksi tavoitteena oli pyrkiä ...
Implementing and Applying ISMS in Organization’s Customer Delivery Projects: Development of a Framework for Project’s Information Security Tasks
(2021)
The role of information security and data privacy requirements in IT system development projects is growing as information security awareness and threats are increasing. At the same time information security is seen more ...
Self-assessment of security in cloud deployment
(2019)
Increasing number of services running on top of outsourced cloud environments has led to changes in the security landscape. These changes have created a situation where extra
care is to be applied in order to ensure that ...
Uncovering privacy threats with Soft Systems Methodology: Development of a privacy threat modelling method for today’s needs
(2021)
Uhkia tietosuojan vaatimustenmukaisuudelle osataan tunnistaa, mutta menetelmät puuttuvat sellaisten tietosuojan ja yksityisyyden uhkien tunnistamiseen, jotka nousevat järjestelmien toiminnasta kontekstissa ja henkilötietojen ...