Haku
Viitteet 1-10 / 52
Pre-assessing Cyber Range-Based Event Participants’ Needs and Objectives
(2023)
Cyber arena and cyber range-based cyber exercises and trainings are widely considered beneficial for learners; technical cyber security is best learnt hands-on. In addition to technical Information and Communication ...
Baseboard management controller vulnerabilities, misconfigurations, and exploitation: a case study of Supermicro X11-based BMC security
(2023)
The baseboard management controllers (BMCs) are highly privileged hardware components connected to
server motherboards, powering society's information technology infrastructure. The ever-increasing threat
of opportunistic ...
Implementing Compilation of log data for the Act on Information Management in Public Administration
(2023)
Laki julkisen hallinnon tiedonhallinnasta astui voimaan 1.1.2020. Lain tarkoituksena on edistää viranomaisten tiedonhallintaa. Laki on luonteeltaan yleislaki, joka astuu voimaan, jos erityislainsäädännössä ei toisin määrätä. ...
Evaluating security and privacy of SaaS service
(2023)
Software as a Service (SaaS) -sovelluksista on tullut suosittu tapa IT-palveluiden käyttämiseen, erityisesti pienissä tai keskisuurissa organisaatioissa (pk-yritykset). SaaS-mallissa asiakas on riippuvainen palveluntarjoajasta ...
Cyber security risk management method for hospital pharmacy: pharmaceutical service operations
(2023)
Sosiaali- ja terveysala on kokenut Suomessa suuria muutoksia sosiaali-, terveys- ja pelastuspalveluiden uudelleen järjestelyjen seurauksena ja uudet hyvinvointialueet ovat aloittaneet toimintansa vuonna 2023. Uusia ...
Cyber Incident Response in Public Cloud: implications of modern cloud computing characteristics for cyber incident response
(2023)
Modern cloud computing has fundamentally changed how IT-resources are consumed by organizations and end-users. The cloud is also defined by some of its key characteristics: on-demand self-service, broad network access, ...
Enhancing incident management process
(2023)
Tietoturvapoikkeamien hallintaprosessi on tärkeä osa organisaation kykyä ratkaista tapahtuneet tietoturvaloukkaukset tehokkaasti. Prosessi määrittelee oleelliset osa-alueet ja ohjeistaa miten tietoturvapoikkeamien aikana ...
Zero Trust Guidelines for Enterprises
(2023)
In today’s digital environment, enterprises must always be mindful of potential cyberattacks, a phenomenon that has been increasing yearly due to various factors, including the rapid development of technology and devices. ...
Joining NATO: Effects on Finland's Cyber Security
(2023)
The objective of this thesis was to identify the strengths and weaknesses of Finland’s cyber security as well as the threats and opportunities of NATO membership. These effects were used to analyze how to benefit most from ...
Cybersecurity Mesh Architecture - a suitability analysis from the service providers point of view
(2023)
Perinteisistä tietoturvamalleista on tullut yhä tehottomampia nykyaikaisten, monimutkaisten ja hajautettujen IT-ympäristöjen turvaamisessa. Cybersecurity Mesh Architecture (CSMA) on uusi tietoturvamalli, joka tarjoaa ...