"cyber security" - Selaus asiasanan mukaan Laurea-ammattikorkeakoulu
Viitteet 1-20 / 22
-
An Information security audit for a Finnish paper mill
(2021)The purpose of this thesis project was to conduct an IT security audit on a paper mill’s office systems. This was carried out with a partner company that provides information technology solutions and services. The goal for ... -
Analysis of E-skills Found in Job Postings
(2022)The purpose of this thesis is to find out what kind of e-skills are being sought in the United Kingdom’s labour market. The thesis examines job postings from various fields, such as cyber security, the IT sector, and fields ... -
Capabilities and Use of Cortex as part of the DYNAMO project
(2022)According to the 2022 Cyber Threat Report from SonicWall, the volume of ransomware attacks in 2021 grew by 105% from 2020 and was multiplied by three compared to 2019. This alarming signal demonstrates the need for more ... -
Cyber Security and Trust: Tools for Multi-agency Cooperation between Public Authorities
(SCITEPRESS Science and Technology Publications, 2015)Functions vital to society, such as public protection and disaster relief (PPDR), are increasingly dependent on networks, electricity and data processing infrastructure. Incidents such as natural hazards and organized crime ... -
Cyber security in customer support: needs analysis and training outline
(2024)The subject of this thesis project was the needs analysis and outline for cyber security awareness training in a customer support department. The client was a company working in the mobility sector. The first part of ... -
Cybersecurity development and business continuity plan for car dealership
(2022)The purpose of this thesis was to investigate the capability of the case company to meet the challenges of current and growing security threats and to come up with a development plan to increase the level of cyber security ... -
Cybersecurity skill development through degree programme relative to labor market
(2021)In recent years cybersecurity has become global concern for all citizens. Importance of this research should not be underestimated considering the growth technological fields and cyber threats, that comes with it. Finland ... -
Developing a cybersecurity plan for the websites of case company X
(2021)The development task of this project is to create a cybersecurity plan for the websites of the case company. This thesis aims to identify and assess various risks that could affect the websites of the case company and ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Developing as an information security management professional in a consultancy organization
(2023)The objective of the thesis was to develop myself as an information security management professional and document the processes and tools used in day-to-day work and within the work projects. To achieve this, the diary ...Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad -
Developing cyber security competences using NICE KSAs in cyber ranges
(2020)This Bachelor’s thesis delves into the significance of cyber ranges and how they can contribute to university cyber security programs. The goal of the thesis project was twofold: firstly, to bring ... -
Echo e-Skill and training Toolkit user experiences regarding user vulnerabilities
(2023)This thesis report presents user experience study for ECHO e-Skills and training Toolkit application that provides skills gap data in the work community. The Toolkit was created by Laurea University of Applied Sciences ... -
Ethics of Cybersecurity and Biomedical Ethics – Providing Ethical Guidelines for the SHAPES Project
(2021)Opinnäytetyön tavoitteena oli muodostaa eettiset ohjeistukset SHAPES-hankkeelle kyberturvallisuuden sekä lääketieteen tunnettuja teorioita hyödyntäen. Eettiset ohjeistukset toteutettiin Hevnerin Design Science Research ... -
Implementation of ISO 27002:2017 Cyber Security Risk Management guide
(2020)The utilization of cyber dimensions in the operational activities of organizations has grown exponentially in recent years. As functions are networked, their dependence on the functionality of cyber environments is also ... -
Implementing Vulnerability Assessment Tool as an On-Premises configuration
(2019)The purpose of this thesis project was to find a suitable vulnerability assessment application, that offers comprehensible features that allows the client to scan for vulnerabilities and exploits in their IT infrastructure. ... -
Joining NATO: Effects on Finland's Cyber Security
(2023)The objective of this thesis was to identify the strengths and weaknesses of Finland’s cyber security as well as the threats and opportunities of NATO membership. These effects were used to analyze how to benefit most from ... -
Measures needed to integrate physical and cyber security in railways infrastructure : organization X case study
(2021)Technological innovations, digitalization, and the increasing adaptation of IoT components into mass transportation networks worldwide have created new so-called converged security threats for the railway industry's overall ... -
Raising Cybersecurity Awareness and improving Organizational Resilience in the Critical Infrastructure Sector
(2023)This thesis collects information on ways that organizations can raise cybersecurity awareness and improve organizational resilience in the critical infrastructure sector. The thesis was commissioned by the DYNAMO project. ... -
Risk and benefits of IoT appliances in household and business environment
(2019)The objective of this thesis is to raise the readers awareness about IoT technology and illustrate the risks and benefits it brings to the society. What makes this technology truly worthwhile despite the risks, has to be ... -
Secure and Redundant Public Safety Communication Network for Public Protection and Disaster Relief (PPDR) Organizations
(North Atlantic University Press, 2012)European Public Protection and Disaster Relief (PPDR) organizations have similar needs for communications. A common network for PPDR creates synergy and makes interoperability possible. This paper presents a new highly ... -
Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management
(2024)In collaboration with Nixu Corporation, this research focuses on unraveling the critical role of Privileged Access Management (PAM) and Identity and Access Management (IAM) in fortifying organizational cybersecurity. ...