fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kollanus, Sami", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koistinen, Juho", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-12-27T01:34:12Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-12-27T01:34:12Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/56545", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kirjallisuuskatsauksena tehty kandidaatintutkielma tarkastelee tietojenkalastelua esittelem\u00e4ll\u00e4 s\u00e4hk\u00f6postin v\u00e4lityksell\u00e4 tapahtuvan tietojenkalastelun keinoja, suojautumistapoja ja syit\u00e4 sille miksi se onnistuu. Tietojenkalastelua tapahtuu koko ajan maailmanlaajuisesti ja sen uhriksi voi joutua l\u00e4hes kuka tahansa. Tietojenkalastelu aiheuttaa vuosittain mittavia taloudellisia vahinkoja sek\u00e4 yksityisille ihmisille, ett\u00e4 organisaatioille. S\u00e4hk\u00f6posti on ollut yleisesti eniten k\u00e4ytetty alusta, jolla l\u00e4hetet\u00e4\u00e4n tietojenkalasteluviestej\u00e4, ja vaikka teknologian kehittyess\u00e4 tulee koko ajan uusia tapoja ja mahdollisuuksia l\u00e4hett\u00e4\u00e4 tietojenkalasteluviestej\u00e4, niin s\u00e4hk\u00f6postin v\u00e4lityksell\u00e4 niit\u00e4 l\u00e4hetet\u00e4\u00e4n yh\u00e4 edelleen valtavia m\u00e4\u00e4r\u00e4. Tutkielmassa esitell\u00e4\u00e4n nelj\u00e4 yleist\u00e4 keinoa, joiden avulla tietojenkalastelua toteutetaan s\u00e4hk\u00f6postin v\u00e4lityksell\u00e4: kohdennettu tietojenkalastelu, nigerialaiskirjeet, kloonaustietojenkalastelu ja haittaohjelmiin perustuva tietojenkalastelu. N\u00e4m\u00e4 kaikki tietojenkalastelutavat ovat tehokkaita oikein toteutettuna ja siksi on t\u00e4rke\u00e4\u00e4 osata suojautua niilt\u00e4. Kaksi t\u00e4rkeint\u00e4 tapaa suojautua s\u00e4hk\u00f6postin v\u00e4lityksell\u00e4 teht\u00e4v\u00e4lt\u00e4 tietojenkalastelulta ovat teknologiset ratkaisut ja koulutus. Teknologisia ratkaisuja on olemassa monia erilaisia ja yhdist\u00e4-m\u00e4ll\u00e4 n\u00e4m\u00e4 teknologiset ratkaisut tietojenkalastelun vastaisen koulutuksen kanssa saadaan paras mahdollinen suoja tietojenkalastelua vastaan. T\u00e4ydellist\u00e4 suojaa tietojenkalastelua kohtaan on kuitenkin l\u00e4hes mahdotonta saavuttaa. Tietojenkalastelijat pyrkiv\u00e4t ymm\u00e4rt\u00e4m\u00e4\u00e4n ihmisi\u00e4 ja vaikuttamaan heid\u00e4n ajattelu- ja toimintatapoihinsa, saadakseen ihmiset luottamaan itseens\u00e4 ja luovut-tamaan tietojaan ajattelematta asiaa loppuun asti. My\u00f6s ihmisten henkil\u00f6koh-taiset tekij\u00e4t kuten ik\u00e4, sukupuoli, kulttuuri ja aikaisemmat kokemukset voivat vaikuttaa tietojenkalastelun onnistumiseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis, done as a literary review examines phishing by introduc-ing execution and protection ways for email phishing and reasons why it is suc-cessful so often. Phishing is happening all the time worldwide and almost any-one can be a victim of it. Phishing causes every year massive economic damages to normal people and organizations. Email has been commonly the most used phishing platform for phishing and even technology evolves all the time and new ways for phishing come up, massive amounts of phishing messages are sent via email. This bachelors thesis introduces four common execution ways for phishing: spear phishing, nigerian letters, clone phishing and malware based phishing. These are effective ways for phishing and that is why it is im-portant to know how to be protected against them. Two most important ways to be protected against phishing are technological solutions and education. There are many kinds of technological solutions and combining these solutions with education is the most effective way to be protected against phishing. However, it is almost impossible to be fully covered against phishing. Phishers try to understand people and try to affect to their way of thinking, to be able to gain their trust and get them to give information without thinking. People per-sonal aspects as age, gender, culture and earlier experiences may also affect to the effectiveness of phishing.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Juho Koistinen (juvakois) on 2017-12-27 01:34:11.824742. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-12-27T01:34:12Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201712274884.pdf: 508745 bytes, checksum: 75ee750d25fd35fc8ed5a50fd8e9882d (MD5)\r\nlicense.html: 4802 bytes, checksum: 1e5a1c468a752c6ccf1d9073830953dd (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-12-27T01:34:12Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201712274884.pdf: 508745 bytes, checksum: 75ee750d25fd35fc8ed5a50fd8e9882d (MD5)\r\nlicense.html: 4802 bytes, checksum: 1e5a1c468a752c6ccf1d9073830953dd (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": "", "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "s\u00e4hk\u00f6posti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kohdennettu tietojenkalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "haitta-ohjelma", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "S\u00e4hk\u00f6postin v\u00e4lityksell\u00e4 teht\u00e4v\u00e4 tietojenkalastelu", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201712274884", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-12-27T01:34:13Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|