fullrecord |
[{"key": "dc.contributor.advisor", "value": "Isom\u00e4ki, Hannakaisa", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Siironen, Sinikka", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-06-07T09:16:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-06-07T09:16:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50148", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ohjelmisto-ohjattu tietoverkkoarkkitehtuuri on kehitetty nykyaikaisten tietoverkkojen, esimerkiksi pilvipalveluiden, tarpeisiin. T\u00e4ss\u00e4 tutkielmassa selvitettiin, mit\u00e4 tietoturvauhkia ohjelmisto-ohjatussa tietoverkkoarkkitehtuurissa on, miss\u00e4 arkkitehtuurin osissa ne esiintyv\u00e4t ja miten ohjelmisto-ohjatun tietoverkon ja perinteisen tietoverkon tietoturvauhat eroavat toisistaan. Tutkielmassa l\u00f6ydettiin tietoturvauhkia melko tasaisesti koko arkkitehtuurista, ja erityisesti hallintatason ja arkkitehtuurin tasojen rajapintojen tietoturvaa pidettiin t\u00e4rke\u00e4n\u00e4. Kuitenkin ohjelmisto-ohjatun tietoverkon tietoturvaa tulee viel\u00e4 tutkia kattavammin. Perinteiseen tietoverkkoon verrattuna ohjelmisto-ohjattu tietoverkko on turvallisempi, vaikka se aiheuttaakin uusia tietoturvaongelmia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Software-defined networking is an answer to the needs of the modern networks, such as cloud computing. This study attempts to survey the information security threats present in software-defined networking and their placement in the layers and interfaces of the architecture. Furthermore, the threats of the software- defined network are compared to the ones of a traditional network. In the study there were multiple information security threats found in the architecture, and they were spread across the architecture quite evenly. Especially the security of the control layer and the interfaces between layers was considered important. In conclusion, the security issues of software- defined networking still need to be studied more comprehensively. Compared to a traditional network, a software-defined network is more secure, even though it introduces new security threats.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Sinikka Siironen (siansiir) on 2016-06-07 09:16:45.784042. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-06-07T09:16:46Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201606072947.pdf: 121994 bytes, checksum: d603520d89a66e7a56ed7b4be612a436 (MD5)\nlicense.html: 4807 bytes, checksum: 63c8033f4f097dcdec1e36ff167db256 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-06-07T09:16:46Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201606072947.pdf: 121994 bytes, checksum: d603520d89a66e7a56ed7b4be612a436 (MD5)\nlicense.html: 4807 bytes, checksum: 63c8033f4f097dcdec1e36ff167db256 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "24", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmisto-ohjattu tietoverkko", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvauhat", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ohjelmisto-ohjatun tietoverkkoarkkitehtuurin tietoturvauhat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201606072947", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-06-07T09:16:46Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|