fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kokko, Tuomas", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Malvela, Eetu", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-02-27T07:38:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-02-27T07:38:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/100491", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teko\u00e4ly\u00e4 integroitaessa kyberturvallisuuteen tuodaan esiin sek\u00e4 ainutlaatuisia \nmahdollisuuksia ett\u00e4 merkitt\u00e4vi\u00e4 haasteita tietoj\u00e4rjestelmien suojaamisessa. \nT\u00e4ss\u00e4 tutkielmassa tarkastellaan teko\u00e4lypohjaisten uhkien vaikutusta \ntietoj\u00e4rjestelmien kyberturvallisuuteen sek\u00e4 torjuntakeinoja n\u00e4iden riskien \nlievent\u00e4miseksi. \nKirjallisuuskatsauksen avulla analysoidaan teko\u00e4lyn kaksoisroolia: \nkyberturvallisuuden vahvistamisen ty\u00f6kaluna ja toisaalta kehittyneempien \nkyberhy\u00f6kk\u00e4ysten v\u00e4lineen\u00e4. Teko\u00e4lyohjattujen kyberhy\u00f6kk\u00e4ysten havaitaan \nhy\u00f6dynt\u00e4v\u00e4n tietoj\u00e4rjestelmien eheytt\u00e4, saatavuutta ja luottamuksellisuutta. \nTeko\u00e4lyll\u00e4 varustettujen hy\u00f6kk\u00e4ys- ja v\u00e4ist\u00f6tekniikoiden, generatiivisten \nvastakkaisverkostojen (GAN) ja \u00e4lykk\u00e4iden haittaohjelmien k\u00e4ytt\u00f6 tunnistetaan \nyleistyv\u00e4ksi. N\u00e4it\u00e4 k\u00e4ytet\u00e4\u00e4n muun muassa disinformaation luomisessa ja \nkoneoppimismallien harhauttamisessa ja teko\u00e4lypohjaisissa kyberhy\u00f6kk\u00e4yksiss\u00e4. \nLis\u00e4ksi vastakkaisten hy\u00f6kk\u00e4ysten havaitaan johtavan taloudellisiin tappioihin, \noperatiivisiin \nviiv\u00e4styksiin ja luottamuksen heikkenemiseen teko\u00e4lyteknologioita kohtaan. Tutkimustuloksissa korostuu teko\u00e4lyn ja ihmisten yhteisty\u00f6t\u00e4 k\u00e4ytt\u00e4vien, sopeutuvien ja ennakoivien puolustusmekanismien, \nkuten kehittyneiden poikkeavuustunnistusj\u00e4rjestelmien ja teko\u00e4lytehostetun uhkatiedustelun kehitt\u00e4minen. N\u00e4iden mekanismien kiireellisyytt\u00e4 painotetaan, sill\u00e4 niill\u00e4 pyrit\u00e4\u00e4n vastaamaan teko\u00e4lypohjaisten uhkien monimutkaisuuteen. Lis\u00e4ksi teko\u00e4lypohjaisten uhkien vaikutusta voidaan minimoida sitkeiden \ntietoj\u00e4rjestelmien (RIS), sek\u00e4 selitett\u00e4v\u00e4n teko\u00e4lyn (XAI) k\u00e4yt\u00f6ll\u00e4. \nTeko\u00e4lyn vaikutuksen tarkastelu uhkakuviin ja puolustusmalleihin antaa \nymm\u00e4rryst\u00e4 innovatiivisten ratkaisujen kehitt\u00e4miseksi tietoj\u00e4rjestelmien \nsuojaamiseksi yh\u00e4 teko\u00e4lypainotteisemmassa ymp\u00e4rist\u00f6ss\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The integration of artificial intelligence (AI) into cybersecurity is seen to present \nboth significant opportunities and notable challenges for protecting information \nsystems. This thesis investigates how AI-based threats impact the cybersecurity \nof information systems and examines countermeasures to mitigate these risks. \nA comprehensive literature review is employed to explore AI\u2019s dual role in \ncybersecurity\u2014both as a tool to enhance defensive measures and as a vector for \nadvanced cyberattacks. It is highlighted that vulnerabilities in information \nsystems are exploited through AI-driven cyberattacks, undermining their \nintegrity, availability, and confidentiality. The prevalence of intelligent malware, \nAI-powered evasion- and attack -techniques, and generative adversarial \nnetworks (GANs) is identified. These technologies are utilized for creating \ndisinformation and deceiving machine learning models. Furthermore, \nadversarial attacks, where AI-generated malicious inputs disrupt machine \nlearning algorithms, are shown to lead to economic losses, operational delays, \nand diminished trust in AI technologies. The findings highlight the development \nof adaptive and proactive defense mechanisms that integrate human and AI \ncollaboration, such as advanced anomaly detection systems and AI-enhanced \nthreat intelligence. \nThe urgency of these mechanisms is emphasized to address the complexity \nof AI-driven threats effectively. Additionally, the impact of AI-based threats can \nbe mitigated through the implementation of resilient information systems (RIS) \nand explainable AI (XAI), ensuring a more robust and transparent approach to \ncybersecurity challenges. \nBy examining the transformative impact of AI on both threat scenarios and \ndefensive frameworks, the research contributes to the development of innovative \nsolutions for protecting information systems in an AI-dominated environment.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-02-27T07:38:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-02-27T07:38:35Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "35", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "AI-pohjaiset kyberhy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lypohjaisten uhkien vaikutus tietoj\u00e4rjestelmiin ja niiden torjunta", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202502272284", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|