The main goal of the thesis was to study cyber security implementation in different software development frameworks with two different research methods. The first method was a survey aimed at industry supplemented by the second method, literary research answering the research question. The thesis was assigned by the Finnish Defense Forces Logistics Command, which utilized the results of the work in the software procurements bidding competitions. The research project proceeded by first discovering the sources, followed by a literature research based on the sources. The content of the survey aimed at industry was designed against a certain ICT architecture to support the findings of the literature research. The survey was conducted anonymousl...
The topic of the thesis is issue of security during the application development. The main emphasis i...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...
More and more businesses and services are depending on software to run their daily operations and bu...
The advancement of technology has made the development of software applications become unstoppabl...
Especially in software development information security is an everlasting race against changing thre...
In this thesis, I analyze the global supply of security software (for operating system Win-dows) wit...
Context: Software security engineering provides the means to define, implement and verify security i...
The focus of this bachelor’s thesis is the development of cyber security. A lot has changed in the l...
Abstract: Secure software development practices adoption could be the most influential factor for th...
In today's information technology world, there is a growing need for security solutions: information...
Since software products are heavily used in today’s connected society, design and implementation of ...
The study is part of a design research effort: the design of a serious game to raise awareness for s...
The aim of this dissertation thesis is to develop new methodology of information systems penetration...
It’s a matter of time until newly developed software becomes a target for malicious users. They alwa...
The topic of the thesis is issue of security during the application development. The main emphasis i...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...
More and more businesses and services are depending on software to run their daily operations and bu...
The advancement of technology has made the development of software applications become unstoppabl...
Especially in software development information security is an everlasting race against changing thre...
In this thesis, I analyze the global supply of security software (for operating system Win-dows) wit...
Context: Software security engineering provides the means to define, implement and verify security i...
The focus of this bachelor’s thesis is the development of cyber security. A lot has changed in the l...
Abstract: Secure software development practices adoption could be the most influential factor for th...
In today's information technology world, there is a growing need for security solutions: information...
Since software products are heavily used in today’s connected society, design and implementation of ...
The study is part of a design research effort: the design of a serious game to raise awareness for s...
The aim of this dissertation thesis is to develop new methodology of information systems penetration...
It’s a matter of time until newly developed software becomes a target for malicious users. They alwa...
The topic of the thesis is issue of security during the application development. The main emphasis i...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
This thesis is focused on the security rating dilemma of computer defense with the help of penetrati...