• Test automation for Flex Application : Case: Landis+Gyr Oy 

      Hudziak, Sabina (Jyväskylän ammattikorkeakoulu, 2017)
      Test automation has become more and more popular since it helps to save time, and with test automation, tasks impossible to carry out with manual testing can be performed. The thesis was assigned by Landis+Gyr Oy, an ...
    • IoT service platform architecture 

      Kalsi, Jukka (Jyväskylän ammattikorkeakoulu, 2017)
      Telia Finland had some old IoT kind of services such as automatic meter reading for electricity companies as well as alerting and monitoring services. These services based on old legacy technology developed internally, ...
    • Assessing maturity of disaster recovery planning : Case study 

      Ylikangas, Mika (Jyväskylän ammattikorkeakoulu, 2017)
      The idea for this study came from an interest to research disaster recovery planning as a process and how the maturity of the planning process can be measured. Maturity of a process can be described in terms of predictability ...
    • Human behavior from Cyber Security perspective 

      Tikkanen, Tommi (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of the thesis was to consider issues affecting human behavior and to assess if they could be better considered in the implementation of security practices. The study focuses on human behavior when an employee ...
    • Integrating Attack Graph Analysis System in Semi-Isolated Network Environment 

      Vanharanta, Jani (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of the thesis was to evaluate the usability aspects of logic-based attack graph analysis for a conventional Network Operation Centre (NOC) in a semi-isolated network environment. Operational and technical ...
    • Development of Secure IoT Based on Modern Microcontrollers 

      Haluška, Juraj (Jyväskylän ammattikorkeakoulu, 2017)
      This paper describes the development process of a secured Internet of Things (IoT) system. Firstly, it analyses the available technologies and methods for development of secure IoT. It also describes the most suitable ...
    • Decomposition of monolithic web application to microservices 

      Zaymus, Mikulas (Jyväskylän ammattikorkeakoulu, 2017)
      Solteq Oyj has an internal Wellbeing project for massage reservations. The task of this thesis was to transform the monolithic architecture of this application to microservices. The thesis starts with a detailed comparison ...
    • Improving Crash Uniqueness Detection in Fuzzy Testing : Case JyvSectec 

      Pudas, Mikko (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of fuzzing was defined to send malformed data in order to crash the program under test. Fuzzing has been defined as the most powerful test automation tool for discovering the security critical problems of ...
    • Trusted Communication in SDN OpenFlow Channel : Investigating Assumed Trusted Communication between SDN Controller and Switch and Possible Attack Scenarios 

      Haapajärvi, Marika (Jyväskylän ammattikorkeakoulu, 2017)
      Originally the subject of the research was Software Defined Networking (SDN) and particularly the threats towards the architecture and the SDN controller. However, during the research, it became evident that the protocol ...
    • Well-being reservation system 

      Gana, Martin (Jyväskylän ammattikorkeakoulu, 2017)
      Solteq is a company offering E-commerce services to its clients. IBM WebSphere Com- merce is used in most of the projects. There was a need to use more modern technologies so that Solteq could improve its competitiveness ...
    • Enhancing Cyber Security for SME organizations through self-assessments : How self-assessment raises awareness 

      Hassinen, Tarmo (Jyväskylän ammattikorkeakoulu, 2017)
      This thesis primarily studied the importance of self-assessment in increasing business organizations’ cyber security awareness of their ICT environment. The secondary studied item was the relevance of self-assessment in ...
    • Instant mobile receiver : Building a service on top of the Amazon Cloud Services 

      Pastuszek, Lukas (Jyväskylän ammattikorkeakoulu, 2016)
      This paper describes the design, implementation and deployment of a 3-application system including the information of used technologies, architectures and services. The frontend application is a static web application ...
    • Implementing security controls in existing system 

      Savonen, Henri (Jyväskylän ammattikorkeakoulu, 2016)
      The main objective is the investigation of possibilities of elevating existing and old information system to comply with the current information security criteria. The elevation process of one system security is included, ...
    • Linux Patch Management : Comparison of Practical Implementations 

      Pulliainen, Teemu (Jyväskylän ammattikorkeakoulu, 2016)
      Recent public, high-profile vulnerabilities in widely used IT architecture components pose a significant risk to IT systems. As far as public vulnerabilities are concerned, in most cases a mitigation is readily available ...
    • CI System Relocation 

      Tuovila, Jani (Jyväskylän ammattikorkeakoulu, 2016)
      A network of partner companies has established a Virtual Enterprise in order to develop a complex telecommunication device for the customer. The project has been ongoing already for several years and during that time a ...
    • Implementing situational awareness 

      Hulkkonen, Timo (Jyväskylän ammattikorkeakoulu, 2016)
      Implementation of situational awareness system became an objective when Finnish national regulations for A-class systems, in the context of healthcare systems were updated. The updated criteria require IT service providers ...
    • Security Testing of WebSockets 

      Kuosmanen, Harri (Jyväskylän ammattikorkeakoulu, 2016)
      The current state of WebSocket is not an exception when it comes to security issues in traditional web applications. There are vulnerabilities that commonly exist in WebSocket implementations that any attacker could ...
    • Implementing Information Security Management System as a part of business processes : Where to gain competitive advantage for ISMS? 

      Flyktman, Jari (Jyväskylän ammattikorkeakoulu, 2016)
      The Idea and background to the study subject lies in the interest in security, leadership and organizational development. The research question was how to provide best practices to fit these all together in harmony. The ...
    • Suitability of commercial product for Cyber Red Team operations 

      Kuusela, Jukka (Jyväskylän ammattikorkeakoulu, 2016)
      The purpose of this thesis was to study, evaluate and estimate how well commercial penetration and Advanced Persistent Threat (ATP) simulation applications suit Cyber Red Team operations. The beginning of the study clarifies ...
    • Analyzing Java EE application security with SonarQube 

      Paananen, Timo (Jyväskylän ammattikorkeakoulu, 2016)
      The master's thesis studied SonarQube's capabilities to find security weaknesses in a Java EE application. Firstly, the master's thesis aims to recognize possible points where a developer could cause security weakness to ...