fullrecord |
[{"key": "dc.contributor.advisor", "value": "Makkonen, Pekka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Miettinen, Toni", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-01-26T10:22:16Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-01-26T10:22:16Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/48466", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Erilaisia vertaisverkkoja on k\u00e4ytetty muun muassa tiedonsiirrossa jo pitk\u00e4\u00e4n, ja\r\nne ovat nykyp\u00e4iv\u00e4n\u00e4kin runsaassa k\u00e4yt\u00f6ss\u00e4. Monille tuttuja vertaisverkko-ohjel-\r\nmia ovat esimerkiksi BitTorrent ja Spotify. Vertaisverkot ovat vaihtoehto perin-\r\nteiselle asiakas-palvelin \u2013mallille, jota k\u00e4ytet\u00e4\u00e4n todella yleisesti Internetin tie-\r\ndonsiirrossa. Sek\u00e4 vertaisverkkoja, ett\u00e4 asiakas-palvelin \u2013mallilla toteutettuja j\u00e4r-\r\njestelmi\u00e4 k\u00e4ytet\u00e4\u00e4n yleisimmin tiedonsiirtoon tietoverkkojen v\u00e4lityksell\u00e4. Tieto-\r\nturvallisuus on \u00e4\u00e4rimm\u00e4isen t\u00e4rke\u00e4 aihe, sill\u00e4 s\u00e4hk\u00f6isen tietojenk\u00e4sittelyn jat-\r\nkuva lis\u00e4\u00e4ntyminen ja etenkin luottamuksellisten tietojen siirteleminen tietover-\r\nkoissa kasvattaa uhkaa tietojen korruptoitumiselle. T\u00e4rkeiden tietojen joutuessa\r\nv\u00e4\u00e4riin k\u00e4siin niill\u00e4 voidaan aiheuttaa suurta vahinkoa yksityishenkil\u00f6ille tai or-\r\nganisaatioille. T\u00e4ss\u00e4 kirjallisuuskatsauksena toteutetussa tutkielmassa tarkastel-\r\nlaan vertaisverkkoja yleisesti, ja esitell\u00e4\u00e4n niihin liittyvi\u00e4 haasteita tietoturvalli-\r\nsuudessa. Tutkielman tarkoituksena on aluksi luoda selke\u00e4 kuva siit\u00e4 millaisia\r\nj\u00e4rjestelmi\u00e4 vertaisverkot ovat, miten ne toimivat, sek\u00e4 miten ne eroavat keskite-\r\ntyist\u00e4 asiakas-palvelin \u2013malleista. T\u00e4m\u00e4n j\u00e4lkeen paneudutaan tietoturvallisuu-\r\nteen yleisesti sek\u00e4 vertaisverkkojen kontekstissa, ja nostetaan esille haasteita ver-\r\ntaisverkkojen tietoturvallisuudelle. Tutkimustuloksena todetaan, ett\u00e4 suurimmat\r\nhaasteet vertaisverkkojen tietoturvallisuudelle ovat tietoverkkovirukset, reititys-\r\nhy\u00f6kk\u00e4ykset, hakuhy\u00f6kk\u00e4ykset, haittaohjelmat sek\u00e4 sybil-hy\u00f6kk\u00e4ykset.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Different kinds of peer-to-peer (P2P) networks have been used in data transfer-\r\nring for a long time already, and the usage is substantial nowadays as well. Well\r\nknown P2P networks include for example BitTorrent and Spotify. P2P networks\r\nare an alternative to a traditional client/server model, which is used very com-\r\nmonly in data transferring within the Internet. Both P2P and client/server sys-\r\ntems are used most commonly to transfer information via an information net-\r\nwork. Information security is an extremely important subject, since the continu-\r\nously growing amount of electrical data processing and especially transferring\r\nconfidential data within in information networks is increasing the risk for data\r\ncorruption. In the wrong hands, important data can be used to create significant\r\ndamage to private persons and organizations. This thesis was conducted as a lit-\r\nerature review, and it explores the P2P networks in general and presents chal-\r\nlenges to the information security related to them. The objective of the thesis is to\r\nfirst create a clear image of what P2P networks are, how they work and how they\r\ndiffer from client/server models. Then, the information is discussed in general\r\nand within the context of P2P networks and the challenges to information secu-\r\nrity in P2P networks are highlighted. As a result of this research it is discovered,\r\nthat the greatest challenges for information security in P2P networks are network\r\nviruses, routing attacks, access attacks, malicious attacks and Sybil attacks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Toni Miettinen (tomimiet) on 2016-01-26 10:22:16.314818. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-01-26T10:22:16Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201601261282.pdf: 479521 bytes, checksum: 90394eaad030c87fe4e83b6e6b3230d4 (MD5)\r\nlicense.html: 1097 bytes, checksum: ba1dc2d19f81825e5c88f41caf0458da (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-01-26T10:22:16Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201601261282.pdf: 479521 bytes, checksum: 90394eaad030c87fe4e83b6e6b3230d4 (MD5)\r\nlicense.html: 1097 bytes, checksum: ba1dc2d19f81825e5c88f41caf0458da (MD5)\r\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": "", "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "vertaisverkko", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hajautettu j\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Vertaisverkon tietoturvallisuus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201601261282", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-01-26T10:22:17Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|