fullrecord |
[{"key": "dc.contributor.author", "value": "H\u00e4kkinen, Niko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2012-05-23T04:55:00Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2012-05-23T04:55:00Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2012", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/37879", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "H\u00e4kkinen, Niko\r\nTunkeutumisen esto- ja havainnointij\u00e4rjestelmien soveltuvuus verkkopalvelui-den suojaamiseen\r\nJyv\u00e4skyl\u00e4: Jyv\u00e4skyl\u00e4n yliopisto, 2012, 25 s.\r\nTietoj\u00e4rjestelm\u00e4tiede, Kandidaatintutkielma\r\nOhjaaja: Veijalainen Jari\r\nKandidaatintutkielmassa tehd\u00e4\u00e4n katsaus viimeisimpiin turvallisuusuhkiin, selvitet\u00e4\u00e4n tunkeutumisen esto- ja havainnointij\u00e4rjestelmien toimintaperiaattei-ta sek\u00e4 niiden soveltuvuutta verkkopalveluiden suojaamiseen. Tutkielma on luonteeltaan kirjallisuuskatsaus.\r\nInternetin k\u00e4ytt\u00f6 on monipuolistunut voimakkaasti 2000-luvulla, ja sill\u00e4 on yh\u00e4 keskeisempi rooli tietoyhteiskunnan jokap\u00e4iv\u00e4isess\u00e4 viestinn\u00e4ss\u00e4. Inter-net-teknologioiden kehitys on mahdollistanut hyvinkin erilaisten palveluiden tarjoamisen alustariippumattomasti ja ilman yhteensopivuusrajoitteita verkko-palveluina. Verkkopalvelut kiinnostavat rikollisia tahoja, koska usein palvelut sis\u00e4lt\u00e4v\u00e4t henkil\u00f6tietojen lis\u00e4ksi pankki- tai luottokorttitietoja. Turvallisuusuh-kista tarkemmin tarkastellaan verkkopalveluiden kannalta keskeisimpi\u00e4 uhkia.\r\nTietomurtoh\u00e4lyttimi\u00e4, eli tunkeutumisen havainnointij\u00e4rjestelmi\u00e4, voi-daan hy\u00f6dynt\u00e4\u00e4 verkkopalveluiden turvallisuuden edist\u00e4misess\u00e4. J\u00e4rjestelmien taustalla on ajatus normaalista poikkeavan k\u00e4yt\u00f6ksen havaitsemisesta j\u00e4rjestel-m\u00e4ss\u00e4 ja t\u00e4h\u00e4n k\u00e4yt\u00f6kseen reagoimisesta. Yleisesti tunkeutumisen esto- ja ha-vainnointij\u00e4rjestelm\u00e4t luokitellaan joko is\u00e4nt\u00e4- tai verkkopohjaisiksi sen perus-teella, miten j\u00e4rjestelm\u00e4 on toteutettu. Toisaalta tunkeutumisen esto- ja havain-nointij\u00e4rjestelm\u00e4t voidaan jaotella joko tunnistepohjaisiksi (signature-based) tai poikkeuksien havainnointiin perustuviksi (anomaly-based), niiden k\u00e4ytt\u00e4m\u00e4n tunnistusmetodin perusteella. Tunkeutumisen havainnointi voi olla joko reaali-aikaista, eli valvontaa suoritetaan jatkuvasti samalla kun havainnoitavaa aineis-toa tulee, tai erill\u00e4\u00e4n tapahtuvaa, jolloin valvottava aineisto ker\u00e4t\u00e4\u00e4n ensin ja analysointi tehd\u00e4\u00e4n my\u00f6hemmin.\r\nUseat tutkimukset ovat osoittaneet hyvi\u00e4 tuloksia tunkeutumisen havain-nointitekniikoiden kehityksen suhteen sek\u00e4 n\u00e4iden tekniikoiden soveltamisesta verkkojen ja verkkopalveluiden tietoturvaan. Poikkeuksien havainnointiin pe-rustuva j\u00e4rjestelm\u00e4 on varteenotettava vaihtoehto verkkopalveluiden turvaami-sessa, mutta k\u00e4ytett\u00e4vyys ei ole viel\u00e4 samalla tasolla kuin tunnistepohjaisissa j\u00e4rjestelmiss\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Seija Paananen (sepaanan@jyu.fi) on 2012-05-23T04:54:59Z\nNo. of bitstreams: 1\nNiko H\u00e4kkinen.pdf: 362520 bytes, checksum: f1e09528e2eaf286dc099f7a89a164c6 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2012-05-23T04:55:00Z (GMT). No. of bitstreams: 1\nNiko H\u00e4kkinen.pdf: 362520 bytes, checksum: f1e09528e2eaf286dc099f7a89a164c6 (MD5)\n Previous issue date: 2012", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tunkeutumisen estoj\u00e4rjestelm\u00e4", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "unkeutumisen havainnointij\u00e4rjestelm\u00e4", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IDS", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "verkkopalvelu", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tunkeutumisen esto- ja havainnointij\u00e4rjestelmien soveltuvuus verkkopalveluiden suojaamiseen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201205231706", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|