fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Suontausta, Joona", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-06-06T07:37:17Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-06-06T07:37:17Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/103159", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Almost every information system in modern society is connected to a network, making it part of the digital environment, or cyber environment. Connectivity and the spread of information technology also bring growing risks with them. This means huge amounts of vulnerabilities in information systems, and the vulnerabilities are not limited to technology itself. In addition, personnel and organizational processes need to be updated in the field of cybersecurity to suppress vulnerabilities. There are different types of users in the cyber environment, and some are ready to exploit this environment as part of warfare. This is called cyber warfare. It refers to cyber-attacks conducted by state actors or an APT group operating with state funding. These attacks have a political objective and affect, for example, infrastructure, information management, and the safety of citizens. It has been noted from the war in Ukraine that Russia has sought to undermine Ukraine\u2019s critical infrastructure with cyber-attacks.\nThis thesis aimed to develop an understanding of the actors in cyber warfare and to describe the methods and tactics they use. The thesis also assessed the threats posed by actors and their motivations. This thesis delved into the capabilities of the attacker from the perspective of critical infrastructure protection. The goal was to determine how vulnerabilities are managed as part of national cyber defense and organizational cybersecurity.\nThis master\u2019s thesis has been conducted as a qualitative study. The phenomenon at the center of qualitative research should be examined from as many different perspectives as possible. The topic and research problem of the thesis is limited and determined by the material and its analysis method. The study was based on a factual perspective because the study is interested in the information that the available material reveals about the research object. The analysis of the material was conducted as a content analysis.\nThe results of the study were analyzed using two case studies using an assessment tool. The results showed that vulnerabilities in critical systems can be managed and minimized if all areas are in order in the organization\u2019s operations. If even one area is poorly considered or its level is non-existent, it opens a new attack vector for the attacker. Risk management and cyber resilience are influential factors in managing vulnerabilities in critical systems. The most common cyber vulnerabilities targeting critical systems are often found through weaknesses in the target systems.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nyky-yhteiskunnassa melkein jokainen tietoj\u00e4rjestelm\u00e4 on yhdistetty tietoverkkoon, jonka avulla se on osa digitaalista toimintaymp\u00e4rist\u00f6\u00e4 eli kybertoimintaymp\u00e4rist\u00f6\u00e4. Liitett\u00e4vyys ja tietotekniikan yleistyminen tuovat mukanaan my\u00f6s kasvavia riskej\u00e4. Se tarkoittaa valtavia m\u00e4\u00e4ri\u00e4 haavoittuvuuksia tietoj\u00e4rjestelmiss\u00e4, eiv\u00e4tk\u00e4 haavoittuvuudet liity pelk\u00e4st\u00e4\u00e4n teknologiaan. My\u00f6s henkil\u00f6st\u00f6 ja organisaation prosessit tarvitsevat kyberturvallisuuden p\u00e4ivitt\u00e4mist\u00e4 haavoittuvuuksien kitkemiseksi. Kybertoimintaymp\u00e4rist\u00f6ss\u00e4 toimii erilaisia k\u00e4ytt\u00e4ji\u00e4. Osa heist\u00e4 on valmiina hy\u00f6dynt\u00e4m\u00e4\u00e4n t\u00e4t\u00e4 toimintaymp\u00e4rist\u00f6\u00e4 osana sodank\u00e4ynti\u00e4. Silloin puhutaan kybersodank\u00e4ynnist\u00e4. Se tarkoittaa valtiollisen toimijan tai valtion rahoituksella toimivan ryhmittym\u00e4n tekemi\u00e4 kyberhy\u00f6kk\u00e4yksi\u00e4. N\u00e4ill\u00e4 hy\u00f6kk\u00e4yksill\u00e4 on poliittinen tavoite ja hy\u00f6kk\u00e4yksill\u00e4 vaikutetaan esimerkiksi infrastruktuuriin, tiedonhallintaan ja kansalaisten turvallisuuteen.\nT\u00e4m\u00e4n tutkielman tarkoituksena on ymm\u00e4rryksen muodostamista kybersodank\u00e4ynnin toimijoista sek\u00e4 kuvata millaisia menetelmi\u00e4 ja taktiikoita he k\u00e4ytt\u00e4v\u00e4t. Tutkielmassa arvioidaan my\u00f6s toimijoiden muodostamia uhkia ja niiden motiiveja. Tutkielma syventyy tarkastelemaan hy\u00f6kk\u00e4\u00e4j\u00e4n kyvykkyyksi\u00e4 kriittisten j\u00e4rjestelmien n\u00e4k\u00f6kulmasta. Tavoitteena on selvitt\u00e4\u00e4, miten haavoittuvuuksia hallitaan osana kansallista kyberpuolustusta ja organisaatioiden kyberturvallisuutta.\nT\u00e4m\u00e4 pro gradu -tutkielma tehtiin kvalitatiivisena tutkimuksena. Laadullisen tutkimuksen keski\u00f6ss\u00e4 olevaa ilmi\u00f6t\u00e4 tarkastellaan mahdollisimman monesta eri n\u00e4k\u00f6kulmasta. Tutkielman aihe ja tutkimusongelma rajasivat ja m\u00e4\u00e4rittiv\u00e4t aineiston sek\u00e4 sen analysointimenetelm\u00e4n. Aineistoon perehtyminen pohjautui faktan\u00e4k\u00f6kulmaan, koska tutkielmassa ollaan kiinnostuneita siit\u00e4 tiedosta, mit\u00e4 k\u00e4ytett\u00e4viss\u00e4 oleva aineisto kertoo tutkimuskohteesta. Aineiston analyysi toteutettiin sis\u00e4ll\u00f6nanalyysin\u00e4. Tutkielman tuloksia analysoitiin tapausesimerkkien avulla k\u00e4ytt\u00e4en Kybermittaria. \nTuloksista havaittiin, ett\u00e4 kriittisten j\u00e4rjestelmien haavoittuvuuksia voidaan hallita, mik\u00e4li kaikki osa-alueet ovat kunnossa organisaation toiminnassa. Mik\u00e4li yksikin osa-alue on huomioitu heikommin tai sen taso on olematon, avaa se hy\u00f6kk\u00e4\u00e4j\u00e4lle varmemman reitin. Riskienhallinta ja kyberresilienssi ovat vaikuttavia tekij\u00f6it\u00e4 kriittisten j\u00e4rjestelmien haavoittuvuuksien hallinnassa. Yleisimm\u00e4t kriittisiin j\u00e4rjestelmiin kohdistuvat haavoittuvuudet l\u00f6ytyv\u00e4t usein kohdej\u00e4rjestelmien heikkouksien kautta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2025-06-06T07:37:17Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-06-06T07:37:17Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "69", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Kybersodank\u00e4ynnin menetelm\u00e4t ja haavoittuvuus", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202506064965", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}]
|