"data security" - Selaus asiasanan mukaan Opinnäytetyöt
Viitteet 1-20 / 26
-
A Web-Based Ticketing System : Improving IT Support Efficiency and Employee Productivity
(2025)This thesis describes the development of a web based ticketing system with the aim of enhancing IT support efficiency and employee productivity. The research design was based on an iterative agile-based prototyping methodology ... -
AI-Enhanced and Traditional Cyber Attacks : A Comparative Analysis : evolving indicators of compromise and defense strategies
(2025)The aim of this thesis was to examine the impact of artificial intelligence on modern attack vectors and defense strategies by comparing traditional cyber attacks with AI-enhanced attacks and analyzing the impact of the ... -
Big Data Using Cloud Computing in Our Life and Technology
(2023)Big data is a huge volume of collected data that can build the cloud and give access in a reliable way to everyone to utilize and process the collected data. Cloud computing is now one main part of almost every organization’s ... -
BYOD implementation at HAMK : requirements & simplifying the process for new students
(2023)The aim of this thesis was to find out the experiences and challenges faced by first- and second-year BCA and BEEA students in implementing Bring Your Own Device (BYOD), and to propose solutions to simplify the implementation ... -
Comparative Analysis of AI Software Against Growing Malware Threats
(2025)In the information technology sector, malicious software (malware) has the potential to cause considerable damage to the system. Traditional malware detection tools may be inadequate for this challenge. The purpose of the ... -
Conference Room Reservation Application
(2021)The purpose of the thesis was to create a proof of concept for the commissioning party. This solution is for an application that will be used for booking a waiting room. This includes creating the web API, creating the ... -
Creating a website for a programmatically generated NFT collection: solana network
(2022)Blockchain facilitates the foundation of the decentralization. Compared to traditional banking systems, it offers a more efficient and secure way of handling transactions. This innovative technology serves as a platform ... -
Data integrity and security: Blockchain vs. traditional databases
(2025)The thesis will provide a comparative between the data integrity and security provided by a blockchain technology and a traditional relational database, with an emphasis on RBAC. As organizations are becoming more dependent ... -
Design and Development of a Leave Management System for Efficient Employee Leave Tracking Using C# and SQL
(2025)This thesis was aimed at designing and developing a Leave Management System to the small and medium sized enterprises in Sri Lanka, to overcome the inefficiencies of the manual leave management system. Manual systems are ... -
Detection and Mitigation of Deepfake Attacks in Cybersecurity : Leveraging Computer Vision and Deep Learning
(2025)In recent years, the production of fake content has grown exponentially, challenging cybersecurity, digital integrity, and public trust. The thesis presented here attempts to implement and evaluate a deepfake detection ... -
Developing a digital performance support tool for entrepreneurial delivery riders in Helsinki
(2025)This thesis presents the development of a mobile application designed to support self-employed food delivery riders working under platform-based systems, such as Foodora in Finland. These workers often face challenges ... -
Disk encryption on Windows : practical evaluation
(2025)In the modern digital landscape, data privacy and security have become critical concerns across all sectors, affecting both enterprises and individuals. The increasing frequency of data breaches and password leaks underscores ... -
Enhancing hosting infrastructure management with AI-powered automation
(2025)Managing hosting infrastructure presents increasing challenges due to demands for high availability, efficient resource allocation, and strict security compliance, while traditional manual administration methods often ... -
Enhancing Security Score analysis with automated integration pipelines
(2025)Tämän opinnäytetyön tavoitteena oli parantaa organisaation tietoturvan tilannekuvaa ja siihen liittyvää päätöksentekoa kehittämällä automatisoitu ratkaisu Microsoft Azuren tietoturvasuositusten ja -pisteiden raportointiin. ... -
Evaluating the advantages of Cisco ACI over traditional Three-Tier Architecture
(2025)Between 2005 to 2013, network infrastructure mainly in the data centers faced issues like scalability, automation, and segmentation. On the other hand, software developers need more bandwidth these days for their applications ... -
Explainable AI-XAI in Cyber Security
(2024)Opinnäytetyön tarkoituksena oli tutkia selitettävän tekoälyn (XAI) hyötyjä tekoälyn (AI) toimintojen ymmärtämiseksi. Tavoitteena oli tutustua XAI:n tarjoamiin mahdollisuuksiin ja sen eri menetelmiin, joiden avulla pyritään ... -
Factors influencing the adoption of cloud computing for a Sri Lankan insurance company
(2025)The objective of this thesis was to examine the factors influencing the adoption of cloud computing in the Sri Lankan insurance sector. The research problem was based on the slower pace of cloud adoption in Sri Lanka ... -
Impact and danger of IT
(2022)The thesis sought to analyze the impact and danger IT can have for general Users, companies, and governments. Its main idea was to show how a regular IT user can be the beginning of a war when using IT incautiously. There ... -
Information Security Testing Plan Model for Secure Software Development
(2022)Tämä opinnäytetyö tutkii tietoturvatestausmallin toteuttamista. Työn pääasiallinen tuotos on tukevan teoreettisen dokumentaation lisäksi testausdokumentti, josta asiakas saa pohjan käytettäväksi tuleville projekteille. ... -
Intelligent recruitment agent for the financial sector
(2025)This thesis is the design and assessment of an intelligent recruitment agent for the financial industry. This system is based on a serverless model and a chatbot, which is an OpenAI language model, as the point of entry ...



















