fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koskinen, Ida", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-11-25T11:15:11Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-11-25T11:15:11Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/52026", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kandidaatin tutkielmassa k\u00e4sitell\u00e4\u00e4n tietojenkalastelun tapoja ja erilaisia suojautumiskeinoja kirjallisuuskatsauksen keinoin. Tietojenkalastelu on jatku-vasti kasvava ilmi\u00f6, mik\u00e4 ei rajoitu en\u00e4\u00e4 pelk\u00e4st\u00e4\u00e4n s\u00e4hk\u00f6postiin. Nyky\u00e4\u00e4n tietojenkalastelua esiintyy esimerkiksi tekstiviesteiss\u00e4, pikaviesteiss\u00e4 ja yhteis\u00f6palveluissa. Tietojenkalastelu voi aiheuttaa merkitt\u00e4vi\u00e4 henkil\u00f6kohtaisia ja taloudellisia vahinkoja sek\u00e4 yrityksille ett\u00e4 yksityishenkil\u00f6ille. T\u00e4st\u00e4 huolimatta k\u00e4ytt\u00e4j\u00e4t eiv\u00e4t useinkaan ole tarpeeksi tietoisia tietojenkalastelun riskeist\u00e4 ja k\u00e4ytt\u00e4j\u00e4t n\u00e4hd\u00e4\u00e4nkin usein heikoimpana lenkkin\u00e4 tietoturvassa. Tietojenkalastelun tavat kehittyv\u00e4t koko ajan, eik\u00e4 yht\u00e4 luodinkest\u00e4v\u00e4\u00e4 ratkaisukeinoa ole olemassa. Usein parhaan suojan saa yhdistelem\u00e4ll\u00e4 useita suojautumiskeinoja. K\u00e4ytt\u00e4jien kouluttaminen on my\u00f6s t\u00e4rke\u00e4\u00e4, sill\u00e4 tekniset suojautumiskeinot eiv\u00e4t torju kaikkia hy\u00f6kk\u00e4yksi\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The goal of this bachelor\u2019s thesis is to examine phishing methods and different defenses with a literature review. Phishing is continuously growing phenome-non which is no longer limited only to email. Today phishing occurs for exam-ple in text messages, instant messages and social networking sites. Phishing can cause significant personal and financial damage to both businesses and individuals. Despite this, users are often not aware enough of the risks of phishing and users are often seen as the weakest link in the information security. Phishing methods are developing all the time and no single silver-bullet solution exists. Often the best protection may be a combination of several protection methods. Training of users is also important because technical defenses don\u2019t prevent all the attacks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Ida Koskinen (idmikosk) on 2016-11-25 11:15:10.606573. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-11-25T11:15:10Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201611254773.pdf: 401761 bytes, checksum: cb85426316f3e72f040ed5ac9764ede5 (MD5)\nlicense.html: 4787 bytes, checksum: 928905e89eb828c484f4f42d1915b7b1 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-11-25T11:15:11Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201611254773.pdf: 401761 bytes, checksum: cb85426316f3e72f040ed5ac9764ede5 (MD5)\nlicense.html: 4787 bytes, checksum: 928905e89eb828c484f4f42d1915b7b1 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "26", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "suojautuminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4n manipulointi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietojenkalastelun tavat ja suojautumiskeinot", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201611254773", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-11-25T11:15:11Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|