fullrecord |
[{"key": "dc.contributor.author", "value": "Teri\u00f6, Jarkko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2011-08-22T07:07:19Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2011-08-22T07:07:19Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2011", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/36569", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Honeypot Systems: Advantages and Disadvantages / Jarkko Teri\u00f6\r\nJyv\u00e4skyl\u00e4: Jyv\u00e4skyl\u00e4n yliopisto, 2011, 31 s.\r\nKandidaatintutkielma\r\nHunajapurkkij\u00e4rjestelm\u00e4t ovat tietoj\u00e4rjestelm\u00e4resursseja, joiden toivotaan tulevan hy\u00f6kk\u00e4yksen kohteeksi. Valvomalla hunajapurkkij\u00e4rjestelmi\u00e4 tarkasti, voidaan hy\u00f6kk\u00e4\u00e4jist\u00e4 ja n\u00e4iden k\u00e4ytt\u00e4mist\u00e4 ty\u00f6kaluista, tekniikoista ja motiiveista oppia paljon. T\u00e4t\u00e4 tietoa voidaan hy\u00f6dynt\u00e4\u00e4 organisaation tietoturvamekanismien parantamisessa. T\u00e4m\u00e4 tutkielma k\u00e4sittelee hunajapurkkij\u00e4rjestelmien uniikkeja ominaisuuksia sek\u00e4 niiden hy\u00f6tyj\u00e4 ja haittoja.\r\nTutkielmaa varten on valittu informaatio- ja kommunikaatioalalla toimivien pienten ja keskisuurten (PK) yritysten n\u00e4k\u00f6kulma. T\u00e4t\u00e4 taustaa vasten selvitet\u00e4\u00e4n hunajapurkkij\u00e4rjestelmien k\u00e4yt\u00e4nn\u00f6n hy\u00f6dyt vastattaessa nykyp\u00e4iv\u00e4n Internetin lukuisiin tietoturvauhkiin. Tutkielman tarkoituksena on selvitt\u00e4\u00e4 kirjallisuuskatsauksen avulla hunajapurkkij\u00e4rjestelmien hy\u00f6dyt ja haitat sek\u00e4 niiden soveltuvuus PK-yritysten tarpeisiin.\r\nTutkielman perusteella voidaan todeta alhaisen vuorovaikutuksen hunajapurkkij\u00e4rjestelmien soveltuvan tietoturvahy\u00f6kk\u00e4ysten trendianalyysia varten. T\u00e4llaiset tuotantohunajapurkkij\u00e4rjestelm\u00e4t soveltuvat mille tahansa organisaatiolle tietoturvamekanismien parantamiseksi. Korkean vuorovaikutuksen hunajapurkkij\u00e4rjestelm\u00e4t sek\u00e4 hunajaverkot sen sijaan vaativat huomattavia yll\u00e4pitoresursseja mutta voivat toisaalta paljastaa arvokasta tietoa hy\u00f6kk\u00e4\u00e4jist\u00e4 ja n\u00e4iden k\u00e4ytt\u00e4mist\u00e4 menetelmist\u00e4. T\u00e4llaiset j\u00e4rjestelm\u00e4t soveltuvat parhaiten tutkimusk\u00e4ytt\u00f6\u00f6n. Hunajapurkkij\u00e4rjestelmien k\u00e4ytt\u00f6\u00f6n liittyy tiettyj\u00e4 haasteita ja riskej\u00e4, jotka tulisi ratkaista ennen niiden k\u00e4ytt\u00f6\u00f6nottoa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Seija Paananen (sepaanan@jyu.fi) on 2011-08-22T07:07:19Z\nNo. of bitstreams: 1\nJarkko Teri\u00f6.pdf: 187268 bytes, checksum: eac15a1545385a509021e0e6ebb6e973 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2011-08-22T07:07:19Z (GMT). No. of bitstreams: 1\nJarkko Teri\u00f6.pdf: 187268 bytes, checksum: eac15a1545385a509021e0e6ebb6e973 (MD5)\n Previous issue date: 2011", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "hunajapurkki", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tunkeutumisenhavaitsemisj\u00e4rjestelm\u00e4", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Honeypot Systems: Advantages and Disadvantages", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-2011082211264", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Luettavissa tekij\u00e4noikeudellisista syist\u00e4 vain Jyv\u00e4skyl\u00e4n yliopiston Tietojenk\u00e4sittelytieteiden laitoksella.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|