Kyberturvallisuus esineiden internetissä

Esineiden internetin laitteiden määrä on jatkuvasti kasvussa ja niiden hyödyt koskettavat kaikkia yhteiskuntamme jäseniä. Valitettavasti samanaikaisesti myös onnistuneiden kyberhyökkäysten määrä on kasvussa ja se uhkaa esineiden inter-netin luotettavuutta. Tämän takia onkin tärkeää tutkia, minkälais...

Full description

Bibliographic Details
Main Author: Hyytiäinen, Teemu
Other Authors: Informaatioteknologian tiedekunta, Informaatioteknologia, University of Jyväskylä, Jyväskylän yliopisto
Format: Bachelor's thesis
Language:fin
Published: 2017
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/56620
_version_ 1828193214432018432
author Hyytiäinen, Teemu
author2 Informaatioteknologian tiedekunta Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_facet Hyytiäinen, Teemu Informaatioteknologian tiedekunta Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto Hyytiäinen, Teemu Informaatioteknologian tiedekunta Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_sort Hyytiäinen, Teemu
datasource_str_mv jyx
description Esineiden internetin laitteiden määrä on jatkuvasti kasvussa ja niiden hyödyt koskettavat kaikkia yhteiskuntamme jäseniä. Valitettavasti samanaikaisesti myös onnistuneiden kyberhyökkäysten määrä on kasvussa ja se uhkaa esineiden inter-netin luotettavuutta. Tämän takia onkin tärkeää tutkia, minkälaisia uhkia esinei-den internet kohtaa ja kuinka näiltä uhkilta voitaisiin suojautua. Tutkielmassa käsitellään esineiden internetin laitteita, mitä kyseiset laitteet ovat, kuinka ne toi-mivat ja miten ne ovat suojattu. Tutkielma toteutettiin kirjallisuuskatsauksena ja sen lähteinä on käytetty pääsääntöisesti akateemisten julkaisujen artikkeleita. Tutkielmassa selvisi esineiden internetin kyberturvallisuuden erityispiirteitä. Näitä ovat fyysisten laitteiden fyysinen suojaamattomuus, langattoman kommu-nikoinnin tuomat ongelmat, sekä useiden esineiden internetin laitteiden heikko laskentateho. Vaikka kirjallisuuden avulla löydettiinkin useita erilaisia uhkia esi-neiden internetille, ei näille uhkille löytynyt samassa mittakaavassa ratkaisuja. Internet of things is constantly growing and benefits from internet of things is helping every member of our society. Unfortunately, succeeded cyberattacks are also on the rise and that is risk for reliability of internet of things. Therefore, it is important to study what kind of threats internet of things faces and how we can protect it better. This thesis concerns how internet of things works, what kind of threats they face and how they are made secure. Thesis is made by literature re-view and sources are mostly academic peer reviewed articles. In the thesis mul-tiple cybersecurity threats, that internet of things faces, were found. These threats are physical vulnerability from physical attacks, wireless communication and low amount of computing power in the devices of internet of things. Even though many threats were found, it became clear that there are not as many direct an-swers on how to solve these threats.
first_indexed 2024-09-11T08:49:18Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Grahn, Hilkka", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Tenkanen, Tuomas", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hyyti\u00e4inen, Teemu", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-01-05T10:08:07Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-01-05T10:08:07Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/56620", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden internetin laitteiden m\u00e4\u00e4r\u00e4 on jatkuvasti kasvussa ja niiden hy\u00f6dyt koskettavat kaikkia yhteiskuntamme j\u00e4seni\u00e4. Valitettavasti samanaikaisesti my\u00f6s onnistuneiden kyberhy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 on kasvussa ja se uhkaa esineiden inter-netin luotettavuutta. T\u00e4m\u00e4n takia onkin t\u00e4rke\u00e4\u00e4 tutkia, mink\u00e4laisia uhkia esinei-den internet kohtaa ja kuinka n\u00e4ilt\u00e4 uhkilta voitaisiin suojautua. Tutkielmassa k\u00e4sitell\u00e4\u00e4n esineiden internetin laitteita, mit\u00e4 kyseiset laitteet ovat, kuinka ne toi-mivat ja miten ne ovat suojattu. Tutkielma toteutettiin kirjallisuuskatsauksena ja sen l\u00e4htein\u00e4 on k\u00e4ytetty p\u00e4\u00e4s\u00e4\u00e4nt\u00f6isesti akateemisten julkaisujen artikkeleita. Tutkielmassa selvisi esineiden internetin kyberturvallisuuden erityispiirteit\u00e4. N\u00e4it\u00e4 ovat fyysisten laitteiden fyysinen suojaamattomuus, langattoman kommu-nikoinnin tuomat ongelmat, sek\u00e4 useiden esineiden internetin laitteiden heikko laskentateho. Vaikka kirjallisuuden avulla l\u00f6ydettiinkin useita erilaisia uhkia esi-neiden internetille, ei n\u00e4ille uhkille l\u00f6ytynyt samassa mittakaavassa ratkaisuja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Internet of things is constantly growing and benefits from internet of things is helping every member of our society. Unfortunately, succeeded cyberattacks are also on the rise and that is risk for reliability of internet of things. Therefore, it is important to study what kind of threats internet of things faces and how we can protect it better. This thesis concerns how internet of things works, what kind of threats they face and how they are made secure. Thesis is made by literature re-view and sources are mostly academic peer reviewed articles. In the thesis mul-tiple cybersecurity threats, that internet of things faces, were found. These threats are physical vulnerability from physical attacks, wireless communication and low amount of computing power in the devices of internet of things. Even though many threats were found, it became clear that there are not as many direct an-swers on how to solve these threats.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Teemu Hyyti\u00e4inen (teehyyti) on 2018-01-05 10:08:06.627567. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2018-01-05T10:08:07Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201801051070.pdf: 620765 bytes, checksum: 4c46cceee7dbfe05024a32e387866ba3 (MD5)\nlicense.html: 4791 bytes, checksum: cd7fba4ee452a7087778c4ef47fea4dd (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-01-05T10:08:07Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201801051070.pdf: 620765 bytes, checksum: 4c46cceee7dbfe05024a32e387866ba3 (MD5)\nlicense.html: 4791 bytes, checksum: cd7fba4ee452a7087778c4ef47fea4dd (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "27", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Esineiden internet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuus esineiden internetiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201801051070", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2018-01-05T10:08:08Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_56620
language fin
last_indexed 2025-03-31T20:02:53Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/0ab8ef26-f7ca-4808-b5de-0efefee373e2\/download","text":"URN:NBN:fi:jyu-201801051070.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Hyytiäinen, Teemu Kyberturvallisuus esineiden internetissä Esineiden internet kyberturvallisuus tietoturva Tietojärjestelmätiede
title Kyberturvallisuus esineiden internetissä
title_full Kyberturvallisuus esineiden internetissä
title_fullStr Kyberturvallisuus esineiden internetissä Kyberturvallisuus esineiden internetissä
title_full_unstemmed Kyberturvallisuus esineiden internetissä Kyberturvallisuus esineiden internetissä
title_short Kyberturvallisuus esineiden internetissä
title_sort kyberturvallisuus esineiden internetissä
title_txtP Kyberturvallisuus esineiden internetissä
topic Esineiden internet kyberturvallisuus tietoturva Tietojärjestelmätiede
topic_facet Esineiden internet Tietojärjestelmätiede kyberturvallisuus tietoturva
url https://jyx.jyu.fi/handle/123456789/56620 http://www.urn.fi/URN:NBN:fi:jyu-201801051070
work_keys_str_mv AT hyytiäinenteemu kyberturvallisuusesineideninternetissä