Mobiililaitteiden haittaohjelmat

Mobiiliuhkien yleistyessä on syytä vähän kartoittaa, mitä haittaohjelmia mobiilipuolelle on jo tullut. Tässä kirjallisuus kartoituksessa tavoite oli yksinkertaisesti kartoittaa nykyisiä mobiilihaittaohjelmia, joista suurimpana alueena ovat troijalaiset. While mobile threats are coming part of our e...

Full description

Bibliographic Details
Main Author: Söderlund, Atte
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Bachelor's thesis
Language:fin
Published: 2013
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/44305
_version_ 1826225794060386304
author Söderlund, Atte
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Söderlund, Atte Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Söderlund, Atte Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Söderlund, Atte
datasource_str_mv jyx
description Mobiiliuhkien yleistyessä on syytä vähän kartoittaa, mitä haittaohjelmia mobiilipuolelle on jo tullut. Tässä kirjallisuus kartoituksessa tavoite oli yksinkertaisesti kartoittaa nykyisiä mobiilihaittaohjelmia, joista suurimpana alueena ovat troijalaiset. While mobile threats are coming part of our every day life, it is important that we survey those threats that are already here. Objective of this paper was to simply survey mobile malware, where the biggest part is toijans.
first_indexed 2014-09-21T20:00:12Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.author", "value": "S\u00f6derlund, Atte", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2014-09-20T21:50:33Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2014-09-20T21:50:33Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2013", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/44305", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Mobiiliuhkien yleistyess\u00e4 on syyt\u00e4 v\u00e4h\u00e4n kartoittaa, mit\u00e4 haittaohjelmia mobiilipuolelle on jo tullut. T\u00e4ss\u00e4 kirjallisuus kartoituksessa tavoite oli yksinkertaisesti kartoittaa\nnykyisi\u00e4 mobiilihaittaohjelmia, joista suurimpana alueena ovat troijalaiset.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "While mobile threats are coming part of our every day life, it is important that\nwe survey those threats that are already here. Objective of this paper was to simply survey\nmobile malware, where the biggest part is toijans.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Atte S\u00f6derlund (atanauso) on 2014-09-20 21:50:32.747076. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2014-09-20T21:50:33Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201409212831.pdf: 221461 bytes, checksum: 23c21f11525f773af5092ca263ce85d3 (MD5)\nlicense.html: 4779 bytes, checksum: ea9b465c6a7d2c9893c97bb49c2270f6 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2014-09-20T21:50:33Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201409212831.pdf: 221461 bytes, checksum: 23c21f11525f773af5092ca263ce85d3 (MD5)\nlicense.html: 4779 bytes, checksum: ea9b465c6a7d2c9893c97bb49c2270f6 (MD5)\n Previous issue date: 2013", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "24", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Mobiili", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "haittaohjelma", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "troijalainen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "virus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "uhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Mobiililaitteiden haittaohjelmat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201409212831", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2014-09-20T21:50:33Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_44305
language fin
last_indexed 2025-02-18T10:54:26Z
main_date 2013-01-01T00:00:00Z
main_date_str 2013
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/5314faec-8aed-4945-8b04-2b805f853bd2\/download","text":"URN:NBN:fi:jyu-201409212831.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2013
record_format qdc
source_str_mv jyx
spellingShingle Söderlund, Atte Mobiililaitteiden haittaohjelmat Mobiili haittaohjelma troijalainen virus uhka Tietotekniikka Mathematical Information Technology
title Mobiililaitteiden haittaohjelmat
title_full Mobiililaitteiden haittaohjelmat
title_fullStr Mobiililaitteiden haittaohjelmat Mobiililaitteiden haittaohjelmat
title_full_unstemmed Mobiililaitteiden haittaohjelmat Mobiililaitteiden haittaohjelmat
title_short Mobiililaitteiden haittaohjelmat
title_sort mobiililaitteiden haittaohjelmat
title_txtP Mobiililaitteiden haittaohjelmat
topic Mobiili haittaohjelma troijalainen virus uhka Tietotekniikka Mathematical Information Technology
topic_facet Mathematical Information Technology Mobiili Tietotekniikka haittaohjelma troijalainen uhka virus
url https://jyx.jyu.fi/handle/123456789/44305 http://www.urn.fi/URN:NBN:fi:jyu-201409212831
work_keys_str_mv AT söderlundatte mobiililaitteidenhaittaohjelmat