fullrecord |
[{"key": "dc.contributor.advisor", "value": "Per\u00e4l\u00e4, Piia", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Taipalus, Toni", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Suhonen, Tatu", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-03-28T18:53:38Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-03-28T18:53:38Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53393", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Terrorismi on teknologian kehittyess\u00e4 siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei en\u00e4\u00e4 ole vain fyysinen, sill\u00e4 ky-beravaruus mahdollistaa tietoverkkojen monipuolisen k\u00e4yt\u00f6n terroristisiin tarpeisiin. Kyberterrorismin uhka on synnytt\u00e4nyt tarpeen luoda uudenlaisia torjuntakeinoja. Yksi kyberterrorismin torjuntaan k\u00e4ytetyist\u00e4 menetelmist\u00e4 on tiedonlouhinta, jonka avulla pystyt\u00e4\u00e4n tehokkaasti l\u00f6yt\u00e4m\u00e4\u00e4n ennest\u00e4\u00e4n tun-tematonta tietoa suurista datam\u00e4\u00e4r\u00e4st\u00e4. T\u00e4ss\u00e4 tutkielmassa tutkitaan kyberter-rorismia ilmi\u00f6n\u00e4 sek\u00e4 tiedonlouhinnan menetelmi\u00e4 ja sovelluksia kyberterro-rismin torjuntaan. Tutkielma on kirjallisuuskatsaus, joka pohjautuu alan tie-teelliseen tutkimukseen, sek\u00e4 niit\u00e4 tukeviin julkaisuihin. Tutkielman tulokse-na voidaan todeta, ett\u00e4 tiedonlouhinnan avulla voidaan pyrki\u00e4 est\u00e4m\u00e4\u00e4n ky-berterroristien iskuja sek\u00e4 etsim\u00e4\u00e4n kyberterroristeja ja heid\u00e4n toimintaansa verkosta. Tiedonlouhintaa voidaan hy\u00f6dynt\u00e4\u00e4 kriittisen infrastruktuurin suo-jaamiseen tarkoitetuissa tunkeutumisen havainnointij\u00e4rjestelmiss\u00e4 j\u00e4rjestel-mien havainnointikyvyn parantamiseen. Verkossa tiedonlouhintaa voidaan hy\u00f6dynt\u00e4\u00e4 kyberterroristien ja kyberterrorismiin viittaavan materiaalin etsi-miseen. Tiedonlouhinta on kuitenkin ensisijaisesti vain p\u00e4\u00e4t\u00f6ksentekoa edis-t\u00e4v\u00e4 ty\u00f6kalu, joka ei est\u00e4 kyberiskuja tapahtumasta. Tiedonlouhinnalla voi-daan silti saavuttaa ennaltaehk\u00e4isev\u00e4 vaikutus ja v\u00e4hent\u00e4\u00e4 kyberterrorismin riskej\u00e4. Datam\u00e4\u00e4rien kasvaessa datan automaattisen k\u00e4sittelyn ja analysoinnin merkitys korostuu, joten tiedonlouhinnalle l\u00f6ytyy tulevaisuudessa viel\u00e4 enemm\u00e4n k\u00e4ytt\u00f6\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Due to technological advancements terrorism has moved to cyberspace and it has transformed into cyberterrorism. The threat of terrorism is no longer pure-ly physical because cyberspace allows versatile use of networks for terrorist use. The threat has generated the need for new kinds of methods to fight against cyberterrorism. One of the used methods is data mining which allows the discovery of new knowledge from large datasets. The goal of this thesis is to examine cyberterrorism as a phenomenon and to discover the different methods and applications where data mining could be used against cyberter-rorism. This thesis is a literature review and it is based on the scientific re-search and other supporting publications. The result of this thesis is that data mining is used to prevent cyberterrorist attacks and to find cyberterrorists and their activities on the web. Data mining can be used to enhance the detection capabilities of intrusion detection systems that are used to protect the nation\u2019s critical infrastructure. On the web data mining can be used to find cyberterror-ists and cyberterrorist related content. However, data mining is primarily a tool for decision making and it does not prevent cyberterrorism from happen-ing. Still it can reduce the risk of cyberterrorism acts and can give valuable information to prevent cyberterrorism. As the amount of data keeps on grow-ing the automatic processing and analyzing of data will be more significant and therefore data mining will have lots of use in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Tatu Suhonen (tatosasu) on 2017-03-28 18:53:37.625586. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-03-28T18:53:38Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201703281785.pdf: 624762 bytes, checksum: 4ae0799a632340bd54de64391dcfa682 (MD5)\nlicense.html: 4788 bytes, checksum: 9087d3d40e80fa1d31dd9fe0d4e069a9 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-03-28T18:53:38Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201703281785.pdf: 624762 bytes, checksum: 4ae0799a632340bd54de64391dcfa682 (MD5)\nlicense.html: 4788 bytes, checksum: 9087d3d40e80fa1d31dd9fe0d4e069a9 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "35", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyber", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "terrorismi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberpuolustus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tiedonlouhinta", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tiedonlouhinta kyberterrorismin torjuntakeinona", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201703281785", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-03-28T18:53:38Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|