Sosiaalinen manipulointi yritysten tietoturvauhkana

Tässä tutkielmassa tarkastellaan sosiaalista manipulointia yritysten tietoturvauhkana inhimillisestä näkökulmasta. Tutkielma keskittyy siihen, miten hyökkääjät pyrkivät manipuloimaan työntekijöitä toimimaan tavalla, joka vaarantaa yrityksen tietoturvallisuuden. Tarkastelun kohteena ovat sosiaalisen...

Full description

Bibliographic Details
Main Author: Lindfors, Eetu
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2025
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/101749
_version_ 1833317359621767168
author Lindfors, Eetu
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Lindfors, Eetu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Lindfors, Eetu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Lindfors, Eetu
datasource_str_mv jyx
description Tässä tutkielmassa tarkastellaan sosiaalista manipulointia yritysten tietoturvauhkana inhimillisestä näkökulmasta. Tutkielma keskittyy siihen, miten hyökkääjät pyrkivät manipuloimaan työntekijöitä toimimaan tavalla, joka vaarantaa yrityksen tietoturvallisuuden. Tarkastelun kohteena ovat sosiaalisen manipuloinnin tekniikat sekä keskeiset ei-tekniset torjuntakeinot, kuten tietoturvapolitiikka, koulutus ja tietoturvakulttuuri. Näiden inhimillisten keinojen merkitys korostuu, koska tekniset ratkaisut eivät yksin riitä suojaamaan sosiaalisen manipuloinnin uhkilta. This thesis examines social engineering as a cybersecurity threat to companies from a human perspective. The thesis focuses on how attackers attempt to manipulate employees into acting in ways that compromise the company's security. The focus is on social engineering techniques as well as key non-technical countermeasures, such as security policies, training, and security culture. The importance of these human-centered measures is emphasized, as technical solutions alone are not sufficient to defend against social engineering threats.
first_indexed 2025-05-06T20:00:39Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": null, "element": "contributor", "schema": "dc", "qualifier": "advisor"}, {"key": "dc.contributor.author", "value": "Lindfors, Eetu", "language": null, "element": "contributor", "schema": "dc", "qualifier": "author"}, {"key": "dc.date.accessioned", "value": "2025-05-06T06:19:10Z", "language": null, "element": "date", "schema": "dc", "qualifier": "accessioned"}, {"key": "dc.date.available", "value": "2025-05-06T06:19:10Z", "language": null, "element": "date", "schema": "dc", "qualifier": "available"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "schema": "dc", "qualifier": "issued"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/101749", "language": null, "element": "identifier", "schema": "dc", "qualifier": "uri"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tarkastellaan sosiaalista manipulointia yritysten tietoturvauhkana inhimillisest\u00e4 n\u00e4k\u00f6kulmasta. Tutkielma keskittyy siihen, miten hy\u00f6kk\u00e4\u00e4j\u00e4t pyrkiv\u00e4t manipuloimaan ty\u00f6ntekij\u00f6it\u00e4 toimimaan tavalla, joka vaarantaa yrityksen tietoturvallisuuden. Tarkastelun kohteena ovat sosiaalisen manipuloinnin tekniikat sek\u00e4 keskeiset ei-tekniset torjuntakeinot, kuten tietoturvapolitiikka, koulutus ja tietoturvakulttuuri.\nN\u00e4iden inhimillisten keinojen merkitys korostuu, koska tekniset ratkaisut eiv\u00e4t yksin riit\u00e4 suojaamaan sosiaalisen manipuloinnin uhkilta.", "language": "fi", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.abstract", "value": "This thesis examines social engineering as a cybersecurity threat to companies from a human perspective. The thesis focuses on how attackers attempt to manipulate employees into acting in ways that compromise the company's security. The focus is on social engineering techniques as well as\nkey non-technical countermeasures, such as security policies, training, and security culture. The importance of these human-centered measures is emphasized, as technical solutions alone are not sufficient to defend against social engineering threats.", "language": "en", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-05-06T06:19:10Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-05-06T06:19:10Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.format.extent", "value": "22", "language": null, "element": "format", "schema": "dc", "qualifier": "extent"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "schema": "dc", "qualifier": "iso"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "schema": "dc", "qualifier": null}, {"key": "dc.subject.other", "value": "sosiaalinen manipulointi", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietoturvakoulutus", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietoturvakulttuuri", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.title", "value": "Sosiaalinen manipulointi yritysten tietoturvauhkana", "language": null, "element": "title", "schema": "dc", "qualifier": null}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "schema": "dc", "qualifier": null}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202505063749", "language": null, "element": "identifier", "schema": "dc", "qualifier": "urn"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "schema": "dc", "qualifier": "coar"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "schema": "dc", "qualifier": "copyright"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "schema": "dc", "qualifier": "accesslevel"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "schema": "dc", "qualifier": "publication"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "manipulaatio (psykologia)", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "vaikuttaminen", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "sosiaalinen vuorovaikutus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "schema": "dc", "qualifier": "url"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}]
id jyx.123456789_101749
language fin
last_indexed 2025-05-20T21:05:50Z
main_date 2025-01-01T00:00:00Z
main_date_str 2025
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/aa564a8f-6443-44cd-9b26-a87b70184759\/download","text":"URN:NBN:fi:jyu-202505063749.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2025
record_format qdc
source_str_mv jyx
spellingShingle Lindfors, Eetu Sosiaalinen manipulointi yritysten tietoturvauhkana sosiaalinen manipulointi tietoturvapolitiikka tietoturvakoulutus tietoturvakulttuuri tietojenkalastelu Tietojenkäsittelytiede Computer Science verkkourkinta yritykset tietoturva turvallisuus manipulaatio (psykologia) vaikuttaminen sosiaalinen vuorovaikutus riskienhallinta
title Sosiaalinen manipulointi yritysten tietoturvauhkana
title_full Sosiaalinen manipulointi yritysten tietoturvauhkana
title_fullStr Sosiaalinen manipulointi yritysten tietoturvauhkana Sosiaalinen manipulointi yritysten tietoturvauhkana
title_full_unstemmed Sosiaalinen manipulointi yritysten tietoturvauhkana Sosiaalinen manipulointi yritysten tietoturvauhkana
title_short Sosiaalinen manipulointi yritysten tietoturvauhkana
title_sort sosiaalinen manipulointi yritysten tietoturvauhkana
title_txtP Sosiaalinen manipulointi yritysten tietoturvauhkana
topic sosiaalinen manipulointi tietoturvapolitiikka tietoturvakoulutus tietoturvakulttuuri tietojenkalastelu Tietojenkäsittelytiede Computer Science verkkourkinta yritykset tietoturva turvallisuus manipulaatio (psykologia) vaikuttaminen sosiaalinen vuorovaikutus riskienhallinta
topic_facet Computer Science Tietojenkäsittelytiede manipulaatio (psykologia) riskienhallinta sosiaalinen manipulointi sosiaalinen vuorovaikutus tietojenkalastelu tietoturva tietoturvakoulutus tietoturvakulttuuri tietoturvapolitiikka turvallisuus vaikuttaminen verkkourkinta yritykset
url https://jyx.jyu.fi/handle/123456789/101749 http://www.urn.fi/URN:NBN:fi:jyu-202505063749
work_keys_str_mv AT lindforseetu sosiaalinenmanipulointiyritystentietoturvauhkana