fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lauhikari, Tarja", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-09-29T10:54:11Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-09-29T10:54:11Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1725382", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/55486", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Digitalisaatio lis\u00e4\u00e4 kyberuhkien mahdollisuutta puolustusvoimien ohjelmistoj\u00e4rjestelmiss\u00e4. Tietoturvaa t\u00e4ytyy jatkuvasti kehitt\u00e4\u00e4, jotta j\u00e4rjestelmien monipuolinen k\u00e4ytt\u00f6 pysyisi turvallisena. Tutkimuksessa haastateltiin kymment\u00e4 asiantuntijaa. Tutkimuksen tarkoitus oli selvitt\u00e4\u00e4 tietoturvaan vaikuttavat tekij\u00e4t ja menetelm\u00e4t j\u00e4rjestelm\u00e4hankinnassa. Tutkittiin, mit\u00e4 asiakkaan tulisi ottaa huomioon ohjelmistokehitysprosessissa, jotta se tukisi tietoturvan kehityst\u00e4. Lis\u00e4ksi vaatimusm\u00e4\u00e4rittely\u00e4 pohdittiin tietoturvan kannalta. T\u00e4rke\u00e4ksi aiheeksi nousi my\u00f6s yhteisty\u00f6 suunnittelijoiden, asiakkaan ja tietoturva-asiantuntijoiden v\u00e4lill\u00e4. Tutkimuksen mukaan asiakkaan tulisi osallistua tiiviisti ohjelmiston kehitysprosessiin. Kehitett\u00e4v\u00e4st\u00e4 j\u00e4rjestelm\u00e4st\u00e4 tulisi tehd\u00e4 uhka-arvio, sek\u00e4 tietoturvavaatimuksissa tulisi ottaa huomioon k\u00e4ytt\u00f6ymp\u00e4rist\u00f6, k\u00e4ytett\u00e4vyys, ohjelmiston ymp\u00e4rill\u00e4 oleva j\u00e4rjestelm\u00e4kokonaisuus ja rajapinnat. Lis\u00e4ksi lakis\u00e4\u00e4teiset ohjeistukset pit\u00e4isi tulkita suunnittelijalle ymm\u00e4rrett\u00e4v\u00e4\u00e4n muotoon.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Customer participation in developing information security with acquisition of software systems requiring strong protection.\r\nDigitalization increases the likelihood of cyber incidents in the software systems of the Defence Forces. Continuous information security development is necessary to ensure that a versatile use of the systems would be still secure. In this study, ten experts were interviewed. The purpose of the study was to identify factors and methods that would help develop security in software systems acquisition. It was studied what items a customer should take into account to support inclusion of security aspects in the software development process. In addition, requirement specification was discussed inform the security point of view. The collaboration between the customer, developers, and security experts became an important topic, too. According to the study, the customer should participate in software development process actively. In the requirements specification, environment, usability, and integrated system together with its interfaces should be considered. Also, a threat assessment should be done. The statutory instructions should be communicated to the developers in terms they understand.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Tarja Lauhikari (takalauh) on 2017-09-29 10:54:09.111436. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-09-29T10:54:10Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201709293879.pdf: 1885479 bytes, checksum: df6609cdac91b465ae4cfd87eda90b44 (MD5)\r\nlicense.html: 4875 bytes, checksum: 1b683284d6d2d3458104d555cec3ea6d (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-09-29T10:54:11Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201709293879.pdf: 1885479 bytes, checksum: df6609cdac91b465ae4cfd87eda90b44 (MD5)\r\nlicense.html: 4875 bytes, checksum: 1b683284d6d2d3458104d555cec3ea6d (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (125 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Ohjelmistokehitysprosessi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ketter\u00e4 kehitys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvavaatimukset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "uhka-arviot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "suojaustasot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "auditointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Asiakkaan osallistuminen tietoturvan kehitt\u00e4miseen hankittaessa vahvaa suojausta vaativia ohjelmistoj\u00e4rjestelmi\u00e4", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201709293879", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-09-29T10:54:11Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmistot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hankinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "puolustusvoimat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ketter\u00e4t menetelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "suojaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sidosryhm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "osallistuminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "auditointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|