fullrecord |
[{"key": "dc.contributor.advisor", "value": "Makkonen, Pekka", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Matilainen, Juhani", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-04-26T12:07:02Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-04-26T12:07:02Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/57777", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Pienet ja keskisuuret yritykset joutuvat yh\u00e4 enenemiss\u00e4 m\u00e4\u00e4rin kyberhy\u00f6kk\u00e4yksen kohteeksi. PK-yrityksen p\u00e4\u00e4t\u00f6ksenteko keskittyy yrityksen toimitusjohtajalle ja h\u00e4nt\u00e4 avustaville avainhenkil\u00f6ille, joiden tiet\u00e4mys ei aina riit\u00e4 kattamaan yrityksen kyberturvallisuutta. Johtuen pienest\u00e4 henkil\u00f6st\u00f6m\u00e4\u00e4r\u00e4st\u00e4 ja suurista suhteellisista koulutuskustannuksista, PK-yritykset suhtautuvat ep\u00e4r\u00f6iden henkil\u00f6st\u00f6n kouluttamiseen kyberturvallisuuden alalla. Kyberturvallisuuden n\u00e4k\u00f6kulmasta PK-yrityst\u00e4 uhkaavat useat eri toimijat, joiden motiivit ja toimintatavat vaihtelevat. Yleisimpin\u00e4 hy\u00f6kk\u00e4ystapoina ovat tietojenkalasteluviestit, erilaiset huijausyritykset sek\u00e4 haittaohjelmat. Pysty\u00e4kseen vastaamaan uhkiin, on yrityksen tunnistettava tietoturvapoikkeamat ja suhtauduttava niihin niiden vaatimalla vakavuudella. Yrityksen on tunnistettava sille t\u00e4rke\u00e4t hy\u00f6dykkeet ja suojattava ne niiden kriittisyyden mukaisesti. Samalla yritykselt\u00e4 vaaditaan tietoturvallisen ty\u00f6skentelyn mahdollistamiseksi johdon tukea, johdonmukaista tiedottamista sek\u00e4 jatkuvaa kouluttamista tietoturva-asioissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Small and medium-sized enterprises are increasingly targeted by cyberattacks. The main decision-maker of the business is the company\u2019s managing director and company\u2019s key personnel assisting him, whose might have a limited knowledge about cyber security to cover company\u2019s safety. Due to the small number of staff and large relative training costs, small and medium-sized enterprises are hesitant to educate on cyber security. From the cyber security\u2019s point of view, small and medium-sized enterprises are threatened by a number of different cyber world actors whose motives and tactics vary. The most common types of attacks are phishing, various types of scamming attacks and different types of malware. In order to respond to threats, the company must identify and address the system vulnerabilities with required seriousness. The most important assets of the company must be identified and protect them in accordance with their criticality. At the same time, support from the management, consistent communication and continuous training in security matters is required to ensure secure way of working.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Juhani Matilainen (jualmati) on 2018-04-26 12:07:01.248704. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2018-04-26T12:07:01Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201804262375.pdf: 550493 bytes, checksum: bb0dcf5017c9107bc92529850536bace (MD5)\nlicense.html: 4776 bytes, checksum: e3382294900d840836313dd9bcd2c56a (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-04-26T12:07:02Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201804262375.pdf: 550493 bytes, checksum: bb0dcf5017c9107bc92529850536bace (MD5)\nlicense.html: 4776 bytes, checksum: e3382294900d840836313dd9bcd2c56a (MD5)\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "PK-yritykset", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietohallinto", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvapoikkeama", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "PK-yritysten kybervalmius", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201804262375", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": null, "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2018-04-26T12:07:02Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|