Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana

Nykyaikana käytetään entistä enemmän tietojärjestelmiä, joihin tallennetaan luottamuksellista tai arkaluontoista tietoa. On myös pahantahtoisia käyttäjiä, jotka haluavat päästä käsiksi tähän arkaluontoiseen tietoon. Tässä tutkielmassa tarkastellaan injektioita ja oikeuksien eskaloitumista keinona sa...

Full description

Bibliographic Details
Main Author: Monola, Petri
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Bachelor's thesis
Language:fin
Published: 2016
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/49903
_version_ 1826225805240303616
author Monola, Petri
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Monola, Petri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Monola, Petri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Monola, Petri
datasource_str_mv jyx
description Nykyaikana käytetään entistä enemmän tietojärjestelmiä, joihin tallennetaan luottamuksellista tai arkaluontoista tietoa. On myös pahantahtoisia käyttäjiä, jotka haluavat päästä käsiksi tähän arkaluontoiseen tietoon. Tässä tutkielmassa tarkastellaan injektioita ja oikeuksien eskaloitumista keinona saada arkaluontoista tietoa tietojärjestelmästä. Tarkemmin injektioista käsitellään kolmea eri tyyppiä: shell-, skripti- ja SQL-injektioita. Oikeuksien eskaloitumiseen liittyen, tutkielmassa tarkastellaan järjestelmien oikeuksien hallintaa sekä miten oikeuksia jaetaan eri tasoihin. Eskaloitumisen estämisen keinona esitellään lyhyesti oikeuksien erottelumenetelmää. Nowadays information systems and databases are constantly growing even more popular, and confidential information are being trusted in the hands of such systems. There are also malicious users who want to get their hands on this confidential information. This paper looks into injections and privilege escalation as a way of extracting confidential information out of information systems. Three types of injections are included: shell, script and SQL-injections. This paper inspect ways of controlling privileges in a system and how privileges are divided into levels. Privilege separation is briefly introduced as a method of preventing privilege escalation.
first_indexed 2024-09-11T08:49:05Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Monola, Petri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-05-24T11:19:09Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-05-24T11:19:09Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/49903", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nykyaikana k\u00e4ytet\u00e4\u00e4n entist\u00e4 enemm\u00e4n tietoj\u00e4rjestelmi\u00e4, joihin tallennetaan luottamuksellista tai arkaluontoista tietoa. On my\u00f6s pahantahtoisia k\u00e4ytt\u00e4ji\u00e4, jotka haluavat p\u00e4\u00e4st\u00e4 k\u00e4siksi t\u00e4h\u00e4n arkaluontoiseen tietoon. T\u00e4ss\u00e4 tutkielmassa tarkastellaan injektioita ja oikeuksien eskaloitumista keinona saada arkaluontoista tietoa tietoj\u00e4rjestelm\u00e4st\u00e4. Tarkemmin injektioista k\u00e4sitell\u00e4\u00e4n kolmea eri tyyppi\u00e4: shell-, skripti- ja SQL-injektioita. Oikeuksien eskaloitumiseen liittyen, tutkielmassa tarkastellaan j\u00e4rjestelmien oikeuksien hallintaa sek\u00e4 miten oikeuksia jaetaan eri tasoihin. Eskaloitumisen est\u00e4misen keinona esitell\u00e4\u00e4n lyhyesti oikeuksien erottelumenetelm\u00e4\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nowadays information systems and databases are constantly growing even more popular, and confidential information are being trusted in the hands of such systems. There are also malicious users who want to get their hands on this confidential information. This paper looks into injections and privilege escalation as a way of extracting confidential information out of information systems. Three types of injections are included: shell, script and SQL-injections. This paper inspect ways of controlling privileges in a system and how privileges are divided into levels. Privilege separation is briefly introduced as a method of preventing privilege escalation.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Petri Monola (pekamono) on 2016-05-24 11:19:08.565033. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-05-24T11:19:09Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201605242678.pdf: 433904 bytes, checksum: 64898da2337e11379304f62be8a492fc (MD5)\nlicense.html: 4823 bytes, checksum: fa1a95872bd8b731d088f78e0c2b4348 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-05-24T11:19:09Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201605242678.pdf: 433904 bytes, checksum: 64898da2337e11379304f62be8a492fc (MD5)\nlicense.html: 4823 bytes, checksum: fa1a95872bd8b731d088f78e0c2b4348 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "24", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "injektiot", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "oikeuksien eskaloituminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "arkaluontoinen tieto", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoj\u00e4rjestelm\u00e4", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cross-site scripting", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SQL-injektio", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "shell-injektio", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "skripti-injektio", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201605242678", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-05-24T11:19:11Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_49903
language fin
last_indexed 2025-02-18T10:56:13Z
main_date 2016-01-01T00:00:00Z
main_date_str 2016
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/72f911ff-f79b-4f44-9b13-db099d88be91\/download","text":"URN:NBN:fi:jyu-201605242678.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2016
record_format qdc
source_str_mv jyx
spellingShingle Monola, Petri Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana injektiot oikeuksien eskaloituminen arkaluontoinen tieto tietojärjestelmä cross-site scripting SQL-injektio shell-injektio skripti-injektio Tietotekniikka Mathematical Information Technology
title Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
title_full Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
title_fullStr Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
title_full_unstemmed Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
title_short Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
title_sort injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
title_txtP Injektiot ja oikeuksien eskaloituminen luottamuksellisen tiedon turvaamisen uhkana
topic injektiot oikeuksien eskaloituminen arkaluontoinen tieto tietojärjestelmä cross-site scripting SQL-injektio shell-injektio skripti-injektio Tietotekniikka Mathematical Information Technology
topic_facet Mathematical Information Technology SQL-injektio Tietotekniikka arkaluontoinen tieto cross-site scripting injektiot oikeuksien eskaloituminen shell-injektio skripti-injektio tietojärjestelmä
url https://jyx.jyu.fi/handle/123456789/49903 http://www.urn.fi/URN:NBN:fi:jyu-201605242678
work_keys_str_mv AT monolapetri injektiotjaoikeuksieneskaloituminenluottamuksellisentiedonturvaamisenuhkana