"data security" - Selaus asiasanan mukaan Haaga-Helia ammattikorkeakoulu
Viitteet 1-11 / 11
-
A Proof of Concept for an AWS Lambda malicious code generator tool
(2022)Supply chain poisoning is a type of attack where malicious code is inserted into otherwise legitimate software, and with the rise of cloud solutions and services more threat surface is revealed for this attack. The purpose ... -
Creating a framework for live data analysis of Discord servers
(2023)This thesis looks at how Discord intelligence could be done, discussing not only the technical aspects but also different practices that must be followed to be able to admit collected evidence to courts of law, with a focus ... -
Creating a Linux based wireless HID injector with remote payload interface.
(2023)USB is a flexible protocol that provides a lot of functions and HID functionality which is trust by default on most host systems. This makes it not only versatile but also an attractive point of attack. Among the wide range ... -
Different ways of connecting branch office
(2021)Secure connections have a central role in business. In order to perform safe business, the daily data communications need to be in place and established securely to have a smooth working experience. A secure site-to-site ... -
Helsinki Shipyard: laying the foundation for ISO/IEC 27001
(2023)The ISO/IEC 27001 standard on information security is quickly becoming an unofficial “must have” for organisations. As a sizeable company with an international client list, Helsinki Shipyard elected to adopt the standard ... -
Intellectual property and information security: sensible foundations for micro and small enterprises
(2023)Protecting the intellectual assets of a small business can be a daunting task for a business manager, considering the multitude of information security threats. This report describes the means of protecting intellectual ... -
ISMS Implementation and Maintenance in Compliance with Finland’s National Cybersecurity Requirements
(2022)The thesis is dedicated to the research of common information security standards, regulations, and frameworks with the focus on Information Security Management System (ISMS) implementation and maintenance in compliance ... -
Secure Web Development
(2022)Modern web development comes with a variety of challenges that developers must consider, such as accessibility, responsive design, performance, speed, and scalability to name a few. Unfortunately, due to a lack of time and ... -
The areas of application of blockchain in a supply chain to improve its operations
(2022)The goal of this work was to explore the emerging technology known as blockchain and how it can be used for supply chain management. One of the main objectives was to find out if companies can benefit from blockchain and ... -
The Human Element in IT Security
(2021)This research is focused on the topic of IT security from the perspective of the internal human element by examining employee’s roles in organization’s IT security. This is achieved by examining how big the role of the ... -
The impact of COVID-19 pandemic on User Experience Design of Digital Platforms
(2021)The thesis work is aimed to research the changes in User Experience on Digital Platforms (DP) as a result of the pandemic of Covid-19. The global situation forced the shift into an online reality. Consumerism as we knew ...