fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lepp\u00e4nen Mauri", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Siponen Mikko", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ryyn\u00e4nen, Mikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-01-28T08:25:00Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-01-28T08:25:00Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1465495", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/45171", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietoj\u00e4rjestelmien kehittymisen my\u00f6t\u00e4 my\u00f6s niiden turvallisuus on noussut yh\u00e4 t\u00e4rke\u00e4mp\u00e4\u00e4n rooliin. Turvallisuuden suunnitteluun on kehitetty useita menetelmi\u00e4 ja standardeja, joiden avulla tietoj\u00e4rjestelmien turvallisuusn\u00e4k\u00f6kohdat voidaan kattavasti huomioida. Monet t\u00e4llaiset menetelm\u00e4t toimivat parhaiten vakaassa toimintaymp\u00e4rist\u00f6ss\u00e4, jossa kehitett\u00e4v\u00e4n j\u00e4rjestelm\u00e4n turvallisuus- ja toiminnalliset vaatimukset voidaan suunnitella kattavasti jo ennen j\u00e4rjestelm\u00e4n varsinaista toteuttamista. Ketter\u00e4n j\u00e4rjestelm\u00e4kehityksen menetelm\u00e4t sen sijaan korostavat toiminnallisuutta jo varhaisessa vaiheessa. Kattavan suunnittelun ja dokumentaation sijaan painopiste on iteratiivisessa kehitt\u00e4misess\u00e4 ja muutokset ovat mahdollisia my\u00f6s my\u00f6hemm\u00e4ss\u00e4 vaiheessa kehitysty\u00f6t\u00e4. T\u00e4m\u00e4 voi asettaa haasteita turvallisuuden suunnittelulle, jonka vaatimukset suhteessa ketter\u00e4\u00e4n kehitt\u00e4miseen voivat olla osittain ristiriitaisia. T\u00e4ss\u00e4 tutkielmassa selvitettiin, mit\u00e4 turvallisen tietoj\u00e4rjestelm\u00e4n kehitt\u00e4misstandardeja ja -menetelmi\u00e4 on esitetty k\u00e4ytett\u00e4v\u00e4ksi ja miten turvallisuutta voidaan suunnitella osana ketter\u00e4\u00e4 j\u00e4rjestelm\u00e4kehityst\u00e4. Tutkimusta varten luotiin teoreettinen viitekehys, johon perustuen tarkasteltiin useita aihepiirin julkaisuja ketter\u00e4n kehitt\u00e4misen ja turvallisuuden suunnittelun integroinnista prosessin, roolien, k\u00e4yt\u00e4nteiden ja tuotoksien n\u00e4k\u00f6kulmasta. Tutkimuksen tuloksena tunnistettiin yleisimm\u00e4t ketter\u00e4n kehitt\u00e4misen ja turvallisuuden suunnittelun integroinnin prosessimallit ja roolit. Lis\u00e4ksi esiteltiin lukuisia integrointiin soveltuvia k\u00e4yt\u00e4nteit\u00e4 ja niiden tuotoksia. Tutkimuksen tuloksia voidaan hy\u00f6dynt\u00e4\u00e4 esimerkiksi korkeaa turvallisuutta vaativissa ketteriss\u00e4 j\u00e4rjestelm\u00e4kehityksen projekteissa. Toisaalta tuloksia voidaan hy\u00f6dynt\u00e4\u00e4 my\u00f6s yleisesti tietoj\u00e4rjestelmien kehitt\u00e4misess\u00e4, sill\u00e4 yh\u00e4 useammassa projektissa turvallisuus tulee ottaa jollain tasolla huomioon. Tutkimusalue on suhteellisen laaja, ja tutkielmassa esitet\u00e4\u00e4n my\u00f6s mahdollisia jatkotutkimusaiheita.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information systems are evolving rapidly and the importance of security issues is growing. There are many security engineering methods and standards, which address these security issues. Many of these methods and standards are suitable for stable environments, where security and functional requirements can be specified extensively before the actual implementation. Agile methods, however, emphasize functionality in the early stages of development. They highlight iterative development and changing requirements instead of extensive documentation and planning. This is challenging from the perspective of security engineering, for the reason that some of the security engineering practices contradict to agile development. The aim of this thesis is to find out, what methods have been proposed to address security engineering in agile systems development. More specifically, this thesis focuses on the integration of agile development and security engineering. A theoretical framework was created for this study, forming the basis for analyzing the process, roles, practices and artefacts proposed in studies on the integration. As a result of this study, common process models and roles of security engineering and agile development integration were recognized. In addition, a number of practices and artefacts advancing agile security engineering were introduced. The results of this thesis can be used in secure critical systems development projects. On the other hand, security is increasingly important in any systems development project and the results of this study can be also applied there. The research topic of this thesis is relatively wide and further research themes are also proposed.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Mikko Ryyn\u00e4nen (misaryyn) on 2015-01-28 08:24:59.805755. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2015-01-28T08:25:00Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201501281194.pdf: 5089236 bytes, checksum: 77935e1f1895be3055968cf001b21bb3 (MD5)\nlicense.html: 4826 bytes, checksum: 6bb7397f2f2170e280a0241b8191dc25 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-01-28T08:25:00Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201501281194.pdf: 5089236 bytes, checksum: 77935e1f1895be3055968cf001b21bb3 (MD5)\nlicense.html: 4826 bytes, checksum: 6bb7397f2f2170e280a0241b8191dc25 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (88 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Scrum", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "XP", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Turvallisuuden suunnittelu ketter\u00e4ss\u00e4 j\u00e4rjestelm\u00e4kehityksess\u00e4", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201501281194", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-01-28T08:25:01Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuussuunnittelu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmistokehitys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ketter\u00e4t menetelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|