fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Sipil\u00e4, Joonas", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kari, Martti", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-10-09T05:35:47Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-10-09T05:35:47Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1575507", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/51568", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ven\u00e4j\u00e4\u00e4n kohdistuvasta kyberuhkasta on julkaistu v\u00e4h\u00e4n tutkittua tietoa. Ven\u00e4l\u00e4isiss\u00e4 julkisissa asiakirjoissa kuitenkin on riitt\u00e4v\u00e4sti informaatiota, jotta niiden perusteella pystyy muodostamaan ainakin tyydytt\u00e4v\u00e4n kuvan ven\u00e4l\u00e4isten kokemasta kyberuhkasta. Pro graduni tarkoituksena oli selvitt\u00e4\u00e4, millaisen kyberuhkan ven\u00e4l\u00e4iset arvioivat Ven\u00e4j\u00e4\u00e4n kohdistuvan, kuka uhkaa aiheuttaa ja mit\u00e4 menetelmi\u00e4 uhkan aiheuttaja k\u00e4ytt\u00e4\u00e4. Lis\u00e4ksi pyrin selvitt\u00e4m\u00e4\u00e4n millaisia seurauksia ven\u00e4l\u00e4iset arvioivat mahdollisen kyberuhan toteutumisesta seuraavan. Tutkimusmenetelm\u00e4n\u00e4ni oli grounded theory. Grounded theory sopi hyvin menetelm\u00e4ksi tutkia Ven\u00e4j\u00e4n kokemaa kyberuhkaa, koska aiheesta ei viel\u00e4 ole ollut olemassa teoreettista ja j\u00e4sentynytt\u00e4 tietoa. K\u00e4ytin ty\u00f6ss\u00e4ni aineistona virallisia ven\u00e4l\u00e4isi\u00e4 kyberturvallisuutta k\u00e4sittelevi\u00e4 asiakirjoja kuten strategioita, doktriineja, lakeja ja asetuksia. Aineiston kokoamisessa, ryhmittelyss\u00e4 ja k\u00e4sittelyss\u00e4 k\u00e4ytin apuna Ven\u00e4j\u00e4n Federaation lakia strategisesta suunnittelusta vuodelta 2014. Aineistoon on sis\u00e4llytetty kaksitoista Ven\u00e4j\u00e4n Federaation lakia ja yhdeks\u00e4n presidentin asetusta. Lis\u00e4ksi aineistossa on nelj\u00e4 informaatioturvallisuussopimusta. Ven\u00e4j\u00e4n turvallisuusneuvoston asiakirjoja aineistossa on seitsem\u00e4n. Lis\u00e4ksi materiaalissa on mukana eri ministeri\u00f6iden doktriini- ja ohjausasiakirjoja. Aineistossa on riitt\u00e4v\u00e4sti materiaalia jatkotutkimukseen. Tutkimustuloksena aineistosta ydinkategoriaksi nousi kyberuhkan kohde, jonka k\u00e4sitteiksi eli kyberuhkan yksitt\u00e4isiksi kohteiksi edelleen muotoutuivat strategisen tasan kansalliset intressit, informaatio, informaatioinfrastruktuuri, Ven\u00e4j\u00e4n asevoimat ja muut kohteet, kuten energiasektori, pankkiala ja teollisuus. Rakensin analyysin ja teorian muodostamisen tueksi taulukot k\u00e4sitteist\u00e4 kategorioittain ja edelleen k\u00e4sitteitt\u00e4in. Tutkimukseni johtop\u00e4\u00e4t\u00f6ksen\u00e4 oli muun muassa se, ett\u00e4 ven\u00e4l\u00e4isess\u00e4 kyberuhkakuvassa n\u00e4kyy samanlainen \u201dpiiritetyn linnakkeen\u201d - malli kuin muissakin Ven\u00e4j\u00e4n uhkakuvissa. Kyberuhkakuva heijastaa sek\u00e4 kiristynytt\u00e4 kansainv\u00e4list\u00e4 tilannetta ett\u00e4 my\u00f6s uhkakuvan laadinnasta vastaavien henkil\u00f6iden maailmankuvaa. Ven\u00e4l\u00e4isten huoli omasta teknologisesta j\u00e4lkeenj\u00e4\u00e4neisyydest\u00e4\u00e4n informaatioteknologian alalla tuli hyvin tutkimuksessa esille.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Only a limited amount of information has been published about the cyber threats to Russia. However, in Russian, there is sufficient information contained in official documents to build at least a satisfactory picture of the cyber threats expected by the Russians. The goal of my Master's thesis was to find out what kind of cyber threats Russians expect to be used against them, who might be behind these threats and what methods they might use. In addition, I tried to figure out the Russian estimates of the consequences of the realization of the cyber threat. My research method was grounded theory. Grounded theory was well suited as a method to study the cyber threats expected by the Russians because there is not a lot of theoretical and structured information about the subject. As source material, I used official Russian documents such as strategies, doctrines, laws and presidential decrees. I collected and organized these according to the Russian Federation law on strategic planning for the year 2014. The material includes twelve laws of the Russian Federation and nine presi-dential decrees. In addition, the materials include four information security agreements, seven Russian Security Council documents, and various minis-tries\u2019 doctrine and guidance documents. In the material, there is enough information for further research. Cyber target emerged as the key category of the study. The concept or individual objects under cyber threat shaped the strategic national interests, including information, information infrastructure, the Russian armed forces and other targets such as the energy sector, banking and industry. To support the analysis and to build up the theory, I developed ta-bles by categories and then by concepts. My conclusion was, inter alia, that the Russian cyber threat assessment includes the \u201cFortress besieged\u201d model, similar to what exists in other Russian threat scenarios. The Russian cyber threat picture reflects both the tension of the international situation and the world view of the persons responsible for drawing up the cyber threat scenario. Russian concerns about their own technological backwardness in the field of information technology was clearly seen in the study.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Martti Kari (majokari) on 2016-10-09 05:35:46.608367. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-10-09T05:35:47Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201610094304.pdf: 1335722 bytes, checksum: ea81feb1b3be429a1626357ff49299a7 (MD5)\nlicense.html: 1170 bytes, checksum: 3a953773d403297967f26b7821bc639c (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-10-09T05:35:47Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201610094304.pdf: 1335722 bytes, checksum: ea81feb1b3be429a1626357ff49299a7 (MD5)\nlicense.html: 1170 bytes, checksum: 3a953773d403297967f26b7821bc639c (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (110 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertila", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberoperaatio", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kriittinen informaatioinfrastruktuuri", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatioresurssi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Piiritetty kyberlinnake : Ven\u00e4j\u00e4\u00e4n kohdistuva kyberuhka ven\u00e4l\u00e4isten julkisten asiakirjojen mukaan", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.title.alternative", "value": "Ven\u00e4j\u00e4\u00e4n kohdistuva kyberuhka ven\u00e4l\u00e4isten julkisten asiakirjojen mukaan", "language": null, "element": "title", "qualifier": "alternative", "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201610094304", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-10-09T05:35:47Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ytni", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "infrastruktuurit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "resurssit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Ven\u00e4j\u00e4", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|