"data security" - Selaus asiasanan mukaan Centria-ammattikorkeakoulu

    • Blockchain and real-world assets : Will blockchain disrupt the trading of real-world assets? 

      Rehman, Abdul (2023)
      The purpose of this thesis was to explore the potential of blockchain technology and how it will streamline the process of real-world asset management. In particular, this thesis focused on the feasibility of using blockchain ...
    • Centriaeventia : development of a full-stack university event management platform 

      Fziyen, Sami (2025)
      This thesis focuses on the development of a specialized platform to administer events like workshops and seminars as well as conferences at Centria university of applied sciences. Users accessing the platform will find ...
    • Cybersecurity : Secure code with code auditing 

      Thapa, Bishal (2023)
      The purpose of the thesis was to illuminate the factors related to cyber security focusing on secure coding with code auditing process. These factors included the risk and vulnerabilities in the software, how the vulnerabilities ...
    • Cybersecurity attitudes of computer users 

      Fuchs, Radovan (2022)
      With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the most talked-about issues in the current digital world. Cybersecurity crimes cause substantial costs on a global scale. The ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • Data encryption in Android 

      Ghimire, Ashim (2020)
      The importance of data security is growing every year and the threats to it are increasing every year. Data security in mobile applications is never easy. If a mobile phone is stolen and the screen lock is breached, then ...
    • Data loss prevention : For securing enterprise data integrity 

      Mansikka, Jaakko (2023)
      This final thesis was commissioned by Recion Oy, a regional high-pressure piping company, in order to address a mutually beneficial subject that enhances both the organization's cybersecurity and my personal expertise. The ...
    • Developing a database management SAAS for multi-cloud distributed databases 

      Mohebbi, Farshid (2024)
      In the ever-changing world of DevOps, regular database maintenance and backups are critical to achieving stability and safety by minimizing downtime, performance degradation, security breaches, or data loss. These behaviors ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • Enhancing cloud based software engineering with machine learning 

      Khadka, Birendra (2024)
      With the ability to access virtualized resources on demand, cloud computing has developed into a game-changing technology that enables companies to adapt to changing market conditions and grow their infrastructure through ...
    • Enhancing the security and privacy of home storage servers in private clouds using zero trust principles 

      Mohammady, Hossein (2024)
      As cloud storage for photos and other files has become common these days, making sure that no other person can access your data and gadgets is a serious issue nowadays. Considering this, this research recommends using ...
    • Internet of Things : IoT in security infrastructure systems 

      Jouaher, Jawad (2025)
      This thesis demonstrates the development of an IoT security platform designed to increase hospital security measures alongside medical assistance capabilities. Security authentication, motion surveillance, and emergency ...
    • IT integration in aviation : case study of Helsinki-Vantaa airport 

      Boualam, Imane (2025)
      This thesis focuses on the impact of IT solutions on passengers’ experience, operational efficiency and sustainability at Helsinki-Vantaa Airport. Specifically, the work focuses on the implementation of digital passenger ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • Mobile Security 

      Adhikari, Kushal (2020)
      Mobile security is one of the major problems in this generation. In this computerized era many people use computer and mobile phones in their daily life. This report tells about the mobile security, how cyber criminals ...
    • Quantum computing’s impact on present cryptography 

      Ait Ider, Sara (2024)
      The progress made in technology greatly influences the security of information systems. This is because, with the advancement in technology, demand for cryptographic techniques for protection of communication and information ...
    • Solorence : design and development of a SAAS platform for consultant solopreneurs to manage business with coherence 

      Mohebi, Farzad (2025)
      The thesis project set out to design and develop Solorence – a unified, cloud-hosted workspace intended to replace the fragmented collection of tools typically used for scheduling, client management, documentation and ...
    • Steganology and information hiding : Stegop2py: embedding data in TCP and IP headers 

      Arthur, Maya (2021)
      In the time when the explosion of electronic and digital technologies happened, communication technologies concurrently suffered the same growth. Nowadays, for two parties to communicate, it is as easy as dialling a number, ...
    • The impact of technology on banking in Cameroon 

      Anami, Samuel (2025)
      This research analyses the significance of modern technology in transforming the digital banking sector of Cameroon. It studies the role of mobile money banking in facilitating financial inclusion and the socioeconomic ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • The safeguarding of the consumer in electronic commerce : Comparison analysis between Morocco and Finland 

      Zbadi, Mohamed (2023)
      I decided in this thesis to examine the safeguarding of consumers in the context of e-commerce, specifically focusing on a comparative analysis of the Moroccan and Finnish legislations. Since I studied business law in my ...