fullrecord |
[{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": null, "element": "contributor", "schema": "dc", "qualifier": "advisor"}, {"key": "dc.contributor.author", "value": "Lindfors, Eetu", "language": null, "element": "contributor", "schema": "dc", "qualifier": "author"}, {"key": "dc.date.accessioned", "value": "2025-05-06T06:19:10Z", "language": null, "element": "date", "schema": "dc", "qualifier": "accessioned"}, {"key": "dc.date.available", "value": "2025-05-06T06:19:10Z", "language": null, "element": "date", "schema": "dc", "qualifier": "available"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "schema": "dc", "qualifier": "issued"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/101749", "language": null, "element": "identifier", "schema": "dc", "qualifier": "uri"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tarkastellaan sosiaalista manipulointia yritysten tietoturvauhkana inhimillisest\u00e4 n\u00e4k\u00f6kulmasta. Tutkielma keskittyy siihen, miten hy\u00f6kk\u00e4\u00e4j\u00e4t pyrkiv\u00e4t manipuloimaan ty\u00f6ntekij\u00f6it\u00e4 toimimaan tavalla, joka vaarantaa yrityksen tietoturvallisuuden. Tarkastelun kohteena ovat sosiaalisen manipuloinnin tekniikat sek\u00e4 keskeiset ei-tekniset torjuntakeinot, kuten tietoturvapolitiikka, koulutus ja tietoturvakulttuuri.\nN\u00e4iden inhimillisten keinojen merkitys korostuu, koska tekniset ratkaisut eiv\u00e4t yksin riit\u00e4 suojaamaan sosiaalisen manipuloinnin uhkilta.", "language": "fi", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.abstract", "value": "This thesis examines social engineering as a cybersecurity threat to companies from a human perspective. The thesis focuses on how attackers attempt to manipulate employees into acting in ways that compromise the company's security. The focus is on social engineering techniques as well as\nkey non-technical countermeasures, such as security policies, training, and security culture. The importance of these human-centered measures is emphasized, as technical solutions alone are not sufficient to defend against social engineering threats.", "language": "en", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-05-06T06:19:10Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-05-06T06:19:10Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.format.extent", "value": "22", "language": null, "element": "format", "schema": "dc", "qualifier": "extent"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "schema": "dc", "qualifier": "iso"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "schema": "dc", "qualifier": null}, {"key": "dc.subject.other", "value": "sosiaalinen manipulointi", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietoturvakoulutus", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietoturvakulttuuri", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.title", "value": "Sosiaalinen manipulointi yritysten tietoturvauhkana", "language": null, "element": "title", "schema": "dc", "qualifier": null}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "schema": "dc", "qualifier": null}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202505063749", "language": null, "element": "identifier", "schema": "dc", "qualifier": "urn"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "schema": "dc", "qualifier": "coar"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "schema": "dc", "qualifier": "copyright"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "schema": "dc", "qualifier": "accesslevel"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "schema": "dc", "qualifier": "publication"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "manipulaatio (psykologia)", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "vaikuttaminen", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "sosiaalinen vuorovaikutus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "schema": "dc", "qualifier": "url"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}]
|