fullrecord |
[{"key": "dc.contributor.advisor", "value": "Grahn, Hilkka", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Tenkanen, Tuomas", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hyyti\u00e4inen, Teemu", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-01-05T10:08:07Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-01-05T10:08:07Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/56620", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden internetin laitteiden m\u00e4\u00e4r\u00e4 on jatkuvasti kasvussa ja niiden hy\u00f6dyt koskettavat kaikkia yhteiskuntamme j\u00e4seni\u00e4. Valitettavasti samanaikaisesti my\u00f6s onnistuneiden kyberhy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 on kasvussa ja se uhkaa esineiden inter-netin luotettavuutta. T\u00e4m\u00e4n takia onkin t\u00e4rke\u00e4\u00e4 tutkia, mink\u00e4laisia uhkia esinei-den internet kohtaa ja kuinka n\u00e4ilt\u00e4 uhkilta voitaisiin suojautua. Tutkielmassa k\u00e4sitell\u00e4\u00e4n esineiden internetin laitteita, mit\u00e4 kyseiset laitteet ovat, kuinka ne toi-mivat ja miten ne ovat suojattu. Tutkielma toteutettiin kirjallisuuskatsauksena ja sen l\u00e4htein\u00e4 on k\u00e4ytetty p\u00e4\u00e4s\u00e4\u00e4nt\u00f6isesti akateemisten julkaisujen artikkeleita. Tutkielmassa selvisi esineiden internetin kyberturvallisuuden erityispiirteit\u00e4. N\u00e4it\u00e4 ovat fyysisten laitteiden fyysinen suojaamattomuus, langattoman kommu-nikoinnin tuomat ongelmat, sek\u00e4 useiden esineiden internetin laitteiden heikko laskentateho. Vaikka kirjallisuuden avulla l\u00f6ydettiinkin useita erilaisia uhkia esi-neiden internetille, ei n\u00e4ille uhkille l\u00f6ytynyt samassa mittakaavassa ratkaisuja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Internet of things is constantly growing and benefits from internet of things is helping every member of our society. Unfortunately, succeeded cyberattacks are also on the rise and that is risk for reliability of internet of things. Therefore, it is important to study what kind of threats internet of things faces and how we can protect it better. This thesis concerns how internet of things works, what kind of threats they face and how they are made secure. Thesis is made by literature re-view and sources are mostly academic peer reviewed articles. In the thesis mul-tiple cybersecurity threats, that internet of things faces, were found. These threats are physical vulnerability from physical attacks, wireless communication and low amount of computing power in the devices of internet of things. Even though many threats were found, it became clear that there are not as many direct an-swers on how to solve these threats.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Teemu Hyyti\u00e4inen (teehyyti) on 2018-01-05 10:08:06.627567. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2018-01-05T10:08:07Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201801051070.pdf: 620765 bytes, checksum: 4c46cceee7dbfe05024a32e387866ba3 (MD5)\nlicense.html: 4791 bytes, checksum: cd7fba4ee452a7087778c4ef47fea4dd (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-01-05T10:08:07Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201801051070.pdf: 620765 bytes, checksum: 4c46cceee7dbfe05024a32e387866ba3 (MD5)\nlicense.html: 4791 bytes, checksum: cd7fba4ee452a7087778c4ef47fea4dd (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "27", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Esineiden internet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuus esineiden internetiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201801051070", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2018-01-05T10:08:08Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|