fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Poikolainen, Johanna", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-08-08T19:54:05Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-08-08T19:54:05Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50917", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n kandidaatin tutkielman tarkoituksena on m\u00e4\u00e4ritell\u00e4 mit\u00e4 kyberuhkia val-tiot kohtaavat nykyp\u00e4iv\u00e4n\u00e4 ja miten eri kyberuhkat koskettavat eri valtioita. Li-s\u00e4ksi tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi Suomen ja Israelin kansallisia kyberturvallisuus-strategioita ja selvitet\u00e4\u00e4n, miten niiss\u00e4 varaudutaan eri kyberuhkiin. Tutkimus toteutettiin kirjallisuuskatsauksena.\r\nTutkimuksessa k\u00e4vi ilmi, ett\u00e4 p\u00e4\u00e4asialliset kyberuhkat ovat kybervakoilu, disinformaatio, fyysinen vaikuttaminen sek\u00e4 palvelunestohy\u00f6kk\u00e4ykset. Eri val-tiot kokevat eritasoista uhkaa riippuen niiden aseellisesta puolustuskyvyst\u00e4 sek\u00e4 sosiopoliittisesta koheesiosta. Heikko sosiopoliittinen koheesio altistaa mielipi-teisiin ja yleiseen ilmapiiriin vaikuttaville uhkille, kuten disinformaation levitt\u00e4-miselle, kun taas heikko aseellinen puolustuskyky altistaa useammin palvelunes-tohy\u00f6kk\u00e4yksille ja fyysisille iskuille.\r\nJulkiset kansalliset kyberturvallisuusstrategiat eiv\u00e4t juurikaan ota kantaa yksitt\u00e4isiin kyberuhkiin, vaan ne t\u00e4ht\u00e4\u00e4v\u00e4t sellaiseen yleisesti turvalliseen ja uh-kattomaan kybertoimintaymp\u00e4rist\u00f6\u00f6n. Israelin ja Suomen kansalliset kybertur-vallisuusstrategiat eroavat huomattavasti toisistaan johtuen niiden poliittisten ti-lanteiden erilaisuudesta. Israelin kyberturvallisuusstrategia ottaa suoremmin kantaa tilanteisiin, joissa sen kybertoimintaymp\u00e4rist\u00f6\u00f6n hy\u00f6k\u00e4t\u00e4\u00e4n. Kuitenkin molemmat valtiot painottavat kyberturvallisuustrategioissaan yhteisty\u00f6t\u00e4 yritys-maailman kanssa sek\u00e4 pyrkimyst\u00e4 jatkuvasti kehitt\u00e4\u00e4 teknist\u00e4 osaamista kyber-turvallisuuteen liittyen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor thesis\u2019 aims are to define which kind of cyber threats nations are facing these days and how different cyber threats affect to different countries. Also this thesis contains Finland\u2019s and Israel\u2019s national cyber security strategies and finds out how these countries prepares for cyber threats. This thesis is ac-complished as a literature review.\r\nFindings in the thesis point out that the most important cyber threats on na-tional level are cyber espionage, disinformation, physical attacks through cyber space and denial of services. Countries face different kind of cyber threats de-pending on their ability to defend themselves against military threats and their socio-political cohesion. Weak socio-political cohesion increases vulnerability to disinformation and weak power increases vulnerability to denial of services and physical attacks.\r\nPublic versions of national cyber security strategies do not really focus on one cyber threat at the time, but they aim to overall safe and threatless cyberspace. Israel\u2019s and Finland\u2019s cyber security strategies differ a lot, because of these coun-tries\u2019 different political states. National Security Strategy of Israel focuses more on situations, where their cyber space is attacked. Still both countries point out the importance of co-operation with companies and the aim of constantly pre-paring technical knowledge in cyber security", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Johanna Poikolainen (kijopoik) on 2016-08-08 19:54:05.002828. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-08-08T19:54:05Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201608083737.pdf: 451695 bytes, checksum: 1cc4094b53c3926de2900fee56463c29 (MD5)\r\nlicense.html: 1127 bytes, checksum: b973e48b734803fc8478ae22423da899 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-08-08T19:54:05Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201608083737.pdf: 451695 bytes, checksum: 1cc4094b53c3926de2900fee56463c29 (MD5)\r\nlicense.html: 1127 bytes, checksum: b973e48b734803fc8478ae22423da899 (MD5)\r\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "26", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": "", "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberturvallisuusstrategia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sosiopoliittinen koheesio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "puolustuskyky", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberuhkat ja niiden huomioiminen kansallisissa kyberturvallisuusstrategioissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201608083737", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-08-08T19:54:06Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|