"data security" - Selaus asiasanan mukaan Opinnäytetyöt
Viitteet 1-20 / 20
-
A Web-Based Ticketing System : Improving IT Support Efficiency and Employee Productivity
(2025)This thesis describes the development of a web based ticketing system with the aim of enhancing IT support efficiency and employee productivity. The research design was based on an iterative agile-based prototyping methodology ... -
Big Data Using Cloud Computing in Our Life and Technology
(2023)Big data is a huge volume of collected data that can build the cloud and give access in a reliable way to everyone to utilize and process the collected data. Cloud computing is now one main part of almost every organization’s ... -
BYOD implementation at HAMK : requirements & simplifying the process for new students
(2023)The aim of this thesis was to find out the experiences and challenges faced by first- and second-year BCA and BEEA students in implementing Bring Your Own Device (BYOD), and to propose solutions to simplify the implementation ... -
Comparative Analysis of AI Software Against Growing Malware Threats
(2025)In the information technology sector, malicious software (malware) has the potential to cause considerable damage to the system. Traditional malware detection tools may be inadequate for this challenge. The purpose of the ... -
Conference Room Reservation Application
(2021)The purpose of the thesis was to create a proof of concept for the commissioning party. This solution is for an application that will be used for booking a waiting room. This includes creating the web API, creating the ... -
Creating a website for a programmatically generated NFT collection: solana network
(2022)Blockchain facilitates the foundation of the decentralization. Compared to traditional banking systems, it offers a more efficient and secure way of handling transactions. This innovative technology serves as a platform ... -
Data integrity and security: Blockchain vs. traditional databases
(2025)The thesis will provide a comparative between the data integrity and security provided by a blockchain technology and a traditional relational database, with an emphasis on RBAC. As organizations are becoming more dependent ... -
Detection and Mitigation of Deepfake Attacks in Cybersecurity : Leveraging Computer Vision and Deep Learning
(2025)In recent years, the production of fake content has grown exponentially, challenging cybersecurity, digital integrity, and public trust. The thesis presented here attempts to implement and evaluate a deepfake detection ... -
Developing a digital performance support tool for entrepreneurial delivery riders in Helsinki
(2025)This thesis presents the development of a mobile application designed to support self-employed food delivery riders working under platform-based systems, such as Foodora in Finland. These workers often face challenges ... -
Disk encryption on Windows : practical evaluation
(2025)In the modern digital landscape, data privacy and security have become critical concerns across all sectors, affecting both enterprises and individuals. The increasing frequency of data breaches and password leaks underscores ... -
Enhancing hosting infrastructure management with AI-powered automation
(2025)Managing hosting infrastructure presents increasing challenges due to demands for high availability, efficient resource allocation, and strict security compliance, while traditional manual administration methods often ... -
Evaluating the advantages of Cisco ACI over traditional Three-Tier Architecture
(2025)Between 2005 to 2013, network infrastructure mainly in the data centers faced issues like scalability, automation, and segmentation. On the other hand, software developers need more bandwidth these days for their applications ... -
Explainable AI-XAI in Cyber Security
(2024)Opinnäytetyön tarkoituksena oli tutkia selitettävän tekoälyn (XAI) hyötyjä tekoälyn (AI) toimintojen ymmärtämiseksi. Tavoitteena oli tutustua XAI:n tarjoamiin mahdollisuuksiin ja sen eri menetelmiin, joiden avulla pyritään ... -
Impact and danger of IT
(2022)The thesis sought to analyze the impact and danger IT can have for general Users, companies, and governments. Its main idea was to show how a regular IT user can be the beginning of a war when using IT incautiously. There ... -
Information Security Testing Plan Model for Secure Software Development
(2022)Tämä opinnäytetyö tutkii tietoturvatestausmallin toteuttamista. Työn pääasiallinen tuotos on tukevan teoreettisen dokumentaation lisäksi testausdokumentti, josta asiakas saa pohjan käytettäväksi tuleville projekteille. ... -
IoT authorization with web application
(2021)Today, there are many devices which are connected to the internet in buildings, homes or public places. People cannot deny the convenience provided by IOT. However, lots of risks also come along as security, effectiveness. This ... -
IoT Control using Beckhoff TC3 IoT Data Agent and suggestion for the IoT System at HAMK
(2020)Internet of Things (IoT) technology is becoming increasingly popular and widely used in science and technology circles. There is no doubt about the future potential and its involvement to the human modernization. Therefore, ... -
Practical Applications of Wazuh in On-premises Environments
(2024)This thesis demonstrates the capability of Wazuh, an open-source cybersecurity tool, in deployment as the Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) platform within on-premises ... -
Protection of the frontend and backend using Azure Active Directory authentication
(2023)The thesis sought to find and implement the methods that Azure Active Directory platform provides to secure web applications. The main point is to find effectiveness of such methods as well as understand advantages and ... -
SQL versus NoSQL : comparison case MySQL versus MongoDB
(2023)The growing volume of data and the demand for data-driven applications emphasizes the critical role of selecting an appropriate Database Management System (DBMS). This thesis addresses the significant impact of this decision ...