fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Teirivaara, Tuomas", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-11-13T15:23:30Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-11-13T15:23:30Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/55852", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkielman aiheena on sosiaalinen manipulointi, tietoturvan ihmiselementti ja sen huomioon ottaminen ja hy\u00f6kk\u00e4ysten ehk\u00e4iseminen yrityksen tai organisaation tietoturvassa. Sosiaalisella manipuloinnilla tarkoitetaan tutkielman kontekstissa tietoj\u00e4rjestelm\u00e4n k\u00e4ytt\u00e4jiin kohdistuvaa manipulointia, jonka tavoitteena on informaation keruu tai tietoj\u00e4rjestelm\u00e4\u00e4n murtautuminen. Aihetta on t\u00e4rke\u00e4\u00e4 tutkia, sill\u00e4 useat tietoturva-asiantuntijat ovat yht\u00e4 mielt\u00e4 siit\u00e4, ett\u00e4 merkitt\u00e4vin tietoj\u00e4rjestelm\u00e4n tietoturvauhka on sen k\u00e4ytt\u00e4j\u00e4t ja heid\u00e4n tietoturvallisuuden n\u00e4k\u00f6kulmasta tekem\u00e4t inhimilliset erehdykset. Sosiaalinen manipulointi kohdistuu juuri t\u00e4h\u00e4n tietoturvan heikkouteen. Tutkielman tuloksena on, ett\u00e4 sosiaalinen manipulointi on tehokas strategia hy\u00f6kk\u00e4\u00e4j\u00e4lle k\u00e4ytt\u00e4jien tietoisuuden puutteen ja k\u00e4ytt\u00e4ytymisen ennalta-arvattavuuden johdosta. Sosiaalista manipulointia voidaan k\u00e4ytt\u00e4\u00e4 muun muassa kalastelus\u00e4hk\u00f6posteissa, puhelimitse tai kasvokkain tapahtuvassa keskustelussa. Sen torjumiseen auttaa k\u00e4ytt\u00e4jien tietoisuuden lis\u00e4\u00e4minen esimerkiksi koulutuksen avulla, tietoturvallisuuden rakentaminen monelle eri kerrokselle ja huolellisesti tehdyt, selke\u00e4t tietoturvalinjaukset. Tutkielma on tyypilt\u00e4\u00e4n kirjallisuuskatsaus.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Human element of IT-security : social engineering. \r\n\r\nThe subject of this thesis is Social Engineering, the human element of information security and how it can be taken into account in IT-security strategy and how to prevent against these kinds of attacks. In the context of this study Social Engineering is the act of manipulation of users in order to get information or unauthorized access to information systems. It\u2019s important to study social engineering, because many cyber security professionals agree that users are the weakest link of information systems security. Social engineering targets this weakness. The result of this thesis is that Social Engineering is an effective strategy for the attacker because the lack of user awareness and easily predictable behavior. Social Engineering can be used in the form of phishing emails, via phone or in face to face conversation. User education to make them more aware of the phenomenon, layer based information security and carefully crafted, clear information security policies are all elements to help to prevent Social Engineering. The thesis will be done as a literature review.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Tuomas Teirivaara (tumiteir) on 2017-11-13 15:23:29.463749. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-11-13T15:23:30Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711134239.pdf: 473097 bytes, checksum: a90b41704462bd81cadd8378db48d6ff (MD5)\r\nlicense.html: 4804 bytes, checksum: 643d2b773adc6bcd6aaa62d3d61db27d (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-11-13T15:23:30Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711134239.pdf: 473097 bytes, checksum: a90b41704462bd81cadd8378db48d6ff (MD5)\r\nlicense.html: 4804 bytes, checksum: 643d2b773adc6bcd6aaa62d3d61db27d (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "23", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": "", "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "IT-security", "language": "en", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Social engineering", "language": "en", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Advanced persistent threat", "language": "en", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "APT-hy\u00f6kk\u00e4ys", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4n manipulointi", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sosiaalinen vaikuttaminen", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvan ihmiselementti : sosiaalinen manipulointi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201711134239", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-11-13T15:23:30Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|