fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kokko, Tuomas", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mielik\u00e4inen, Otto", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-02-27T07:28:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-02-27T07:28:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/100485", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietojenkalastelu (phishing) on yksi merkitt\u00e4vimmist\u00e4 kyberturvallisuusuhkista, joka vaikuttaa sek\u00e4 yksityishenkil\u00f6ihin ett\u00e4 organisaatioihin. T\u00e4m\u00e4 tutkielma on kirjallisuuskatsaus, jossa analysoidaan tietojenkalasteluhy\u00f6kk\u00e4ysten teknologisia ja inhimillisi\u00e4 ulottuvuuksia kirjallisuuskatsauksen avulla. Tutkielman tavoitteena on selvitt\u00e4\u00e4, mitk\u00e4 tekij\u00e4t altistavat yrityksi\u00e4 tietojenkalastelulle, mitk\u00e4 teknologiset ratkaisut ovat tehokkaimpia hy\u00f6kk\u00e4ysten torjunnassa ja miten ihmistekij\u00e4t, kuten k\u00e4ytt\u00e4ytyminen ja yrityskulttuuri, vaikuttavat yritysten haavoittuvuuteen. Tulokset osoittavat, ett\u00e4 tietojenkalastelun torjunta vaatii monialaisia l\u00e4hestymistapoja. Teknologiset ratkaisut, kuten koneoppimiseen perustuvat s\u00e4hk\u00f6postinsuodatusj\u00e4rjestelm\u00e4t ja luonnollisen kielen k\u00e4sittely, ovat keskeisi\u00e4 ep\u00e4ilytt\u00e4vien viestien tunnistamisessa. Samalla ty\u00f6ntekij\u00f6iden koulutus ja tietoturvatietoisuuden lis\u00e4\u00e4minen voivat merkitt\u00e4v\u00e4sti v\u00e4hent\u00e4\u00e4 onnistuneiden hy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4\u00e4. Yrityskulttuurin merkitys korostuu erityisesti kohdennetuissa hy\u00f6kk\u00e4yksiss\u00e4, kuten spear phishingiss\u00e4, joissa hy\u00f6dynnet\u00e4\u00e4n yksil\u00f6llisi\u00e4 k\u00e4ytt\u00e4ytymismalleja. Tutkimuksen johtop\u00e4\u00e4t\u00f6ksen\u00e4 todetaan, ett\u00e4 yritysten tulisi yhdist\u00e4\u00e4 teknologiset ja inhimilliset l\u00e4hestymistavat parantaakseen tietoturvaansa. Suosituksia ovat kattavien koulutusohjelmien toteuttaminen, kehittyneiden teknologioiden hy\u00f6dynt\u00e4minen ja tietoturvakulttuurin vahvistaminen. N\u00e4ill\u00e4 toimenpiteill\u00e4 yritykset voivat v\u00e4hent\u00e4\u00e4 merkitt\u00e4v\u00e4sti riski\u00e4 joutua tietojenkalasteluhy\u00f6kk\u00e4ysten kohteeksi ja parantaa kyky\u00e4\u00e4n torjua moderneja kyberuhkia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Phishing is one of the most significant cybersecurity threats, affecting both in-dividuals and organizations. This study analyzes the technological and human aspects of phishing attacks through a literature review. The research aims to identify the factors that expose companies to phishing, the most effective technological solutions for combating such attacks, and the role of human factors, such as behavior and organizational culture, in vulnerability to phishing. The findings indicate that combating phishing requires a multidisciplinary approach. Technological solutions, such as machine learning-based email filtering systems and natural language processing, are critical in detecting suspicious messages. Simultaneously, employee training and increased awareness of cybersecurity can significantly reduce the success rate of phishing attempts. The importance of organizational culture is particularly emphasized in targeted attacks, such as spear phishing, where individual behavioral patterns are exploited. The study concludes that organizations should integrate technological and human-centered approaches to enhance their cybersecurity. Recommendations include implementing comprehensive training programs, utilizing advanced technologies, and fostering a strong security culture. These measures can significantly reduce the risk of phishing attacks and improve organizations' resilience against modern cyber threats.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-02-27T07:28:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-02-27T07:28:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "27", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietojenkalasteluhy\u00f6kk\u00e4ysten torjunta yrityksiss\u00e4 : teknologisten ja inhimillisten tekij\u00f6iden yhdist\u00e4minen kyberturvallisuuteen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202502272278", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.yso", "value": "torjunta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|