fullrecord |
[{"key": "dc.contributor.author", "value": "Buure, Otto", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-04-10T10:37:42Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-04-10T10:37:42Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53544", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kandidaatin tutkielmassa k\u00e4sitell\u00e4\u00e4n esineiden interneti\u00e4 tietoturvan n\u00e4k\u00f6kulmasta.\r\nTutkielma painottuu esineiden internetin tietoturvaongelmiin ja -\r\nhaasteisiin. Tutkielma toteutettiin kirjallisuuskatsauksena tutustumalla esineiden\r\ninterneti\u00e4 sek\u00e4 sen tietoturvaa k\u00e4sitteleviin raportteihin, artikkeleihin ja\r\nmuuhun kirjallisuuteen. Ensin tutkielmassa avataan ja m\u00e4\u00e4ritell\u00e4\u00e4n esineiden\r\ninterneti\u00e4, esineiden internetin elementtej\u00e4, esineiden internetin arkkitehtuuria\r\nja sen avain teknologioita. T\u00e4m\u00e4n j\u00e4lkeen k\u00e4sitell\u00e4\u00e4n tietoturvaa yleisesti, jonka\r\nj\u00e4lkeen siirryt\u00e4\u00e4n esineiden internetin yksityisyyteen, esineiden internetin tietoturvaongelmiin\r\nja mahdollisiin tietoturvahy\u00f6kk\u00e4yksiin. Tutkielman aihe on\r\nmerkitt\u00e4v\u00e4, koska esineiden internetin kehittyess\u00e4 ja laajentuessa kasvaa my\u00f6s\r\ntietoturvauhkien m\u00e4\u00e4r\u00e4. Ottaen huomioon t\u00e4m\u00e4n ja samalla ker\u00e4tyn informaation\r\nm\u00e4\u00e4r\u00e4n, tietoturva- ja yksityisyysongelmat esineiden internetiss\u00e4 tulevat\r\nolemaan todellisia haasteita. Tutkielman pohjalta aiheesta kiinnostuneet saavat\r\nparemman kuvan esineiden internetist\u00e4 ja sen rakenteesta ja siit\u00e4 mink\u00e4laisia\r\ntietoturvaan vaikuttavia tekij\u00f6it\u00e4 siin\u00e4 on. Tutkielman sis\u00e4lt\u00f6 esitet\u00e4\u00e4n lopussa\r\np\u00e4\u00e4piirteitt\u00e4in uusiksi, jonka pohjalta kirjoittaja esitt\u00e4\u00e4 omia pohdintojaan sek\u00e4\r\nesimerkkej\u00e4 jo tapahtuneista tietoturvahy\u00f6kk\u00e4yksist\u00e4 esineiden internetiss\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The Bachelor Thesis explores the Internet of Things today, focusing on security\r\nand privacy issues. The purpose of this thesis is to clarify factors and features\r\ninfluencing in security of the internet of things. The study has been done as a\r\nliterature review based on several information technology reports, articles and\r\nother literature related to the Internet of Things and computer security. First\r\nthe study will open up the term Internet of Things, introduce its\u2019 key elements,\r\nmodel for its\u2019 architecture and its\u2019 key technologies. After that the definition of\r\ncomputer science is opened up, along with the security and privacy issues of\r\nthe Internet of Things. After privacy and security issues, the most common possible\r\nsecurity attacks against the Internet of Things is opened up as well. The\r\nreader of the study will get a clear image of the Internet of Things, and where\r\ndoes it consists of and what kind of security and privacy issues it faces. The internet\r\nof things is growing with accelerating speed, and so are the security issues.\r\nWhat the internet of things needs the most, is standardized technology\r\nsolutions and an official reference model for its\u2019 architecture. With standardized\r\ncommunication and identification technology it\u2019ll become possible to have a\r\nsecure network for internet of things. In the end the content of the study is revisited\r\nand analyzed by the author and few examples of security breaches\r\nagainst the Internet of Things that have already happened are given.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Otto Buure (otvieebu) on 2017-04-10 10:37:42.209695. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-04-10T10:37:42Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201704101943.pdf: 504126 bytes, checksum: 9b8c946b9c943cd774fdd325b805a614 (MD5)\r\nlicense.html: 1078 bytes, checksum: 0b047fefafd36502be3a5e7a6b727cbe (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-04-10T10:37:42Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201704101943.pdf: 504126 bytes, checksum: 9b8c946b9c943cd774fdd325b805a614 (MD5)\r\nlicense.html: 1078 bytes, checksum: 0b047fefafd36502be3a5e7a6b727cbe (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": "", "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "esineiden internet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvaongelmat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "radiotaajuinen et\u00e4tunnistus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Esineiden internetin tietoturvaongelmat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201704101943", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-04-10T10:37:43Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|