fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kaijanaho, Antti-Juhani", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laamanen, Jami", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-05-05T08:20:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-05-05T08:20:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/57858", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Staattisella analyysill\u00e4 tarkoitetaan ohjelmiston ominaisuuksien tarkastelemista k\u00e4\u00e4nt\u00e4m\u00e4tt\u00e4 tai ajamatta ohjelmistoa. T\u00e4m\u00e4 tutkielma on pienimuotoinen kirjallisuuskatsaus, jonka tarkoituksena on l\u00e4hdekirjallisuutta tutkimalla ja j\u00e4sent\u00e4m\u00e4ll\u00e4 tutkia, miten staattisella analyysill\u00e4 voidaan parantaa nykyaikaisten web-applikaatioiden ohjelmistoturvallisuutta. Tutkitun kirjallisuuden perusteella staattista analyysi\u00e4 hy\u00f6dynt\u00e4vill\u00e4 ty\u00f6kaluilla on mahdollista havaita yleisi\u00e4, liiketoiminnan kannalta eritt\u00e4in tuhoisia haavoittuvuuksia ja t\u00e4ten parantaa merkitt\u00e4v\u00e4sti ohjelmistoturvallisuutta. N\u00e4iden ty\u00f6kalujen tehokas hy\u00f6dynt\u00e4minen ohjelmistokehityksen kontekstissa vaatii kuitenkin suunnitelmallisuutta ja teknist\u00e4 tietoutta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Static analysis means examining the properties of software without compiling or executing it. This bachelors thesis is a small-scale literature review that attempts by examining and analysing research literature to explore how static analysis can be used to the improve the security of modern web-applications. Based on the literature examined, static analysis security tools (SAST) are able to detect common software vulnerabilities that can have a disasterous effect on businness, and so are able to significantly improve software security. Using these tools effectively in the context of software development however needs planning and technical knowledge.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Jami Laamanen (jaanella) on 2018-05-05 08:20:54.277124. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2018-05-05T08:20:54Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201805052469.pdf: 187224 bytes, checksum: 739457bc7f186d7787fdcf106082f456 (MD5)\nlicense.html: 4805 bytes, checksum: 1aeb64372de145d87a0946bdb105d908 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-05-05T08:20:55Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201805052469.pdf: 187224 bytes, checksum: 739457bc7f186d7787fdcf106082f456 (MD5)\nlicense.html: 4805 bytes, checksum: 1aeb64372de145d87a0946bdb105d908 (MD5)\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Staattinen analyysi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmistoturvalisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmistokehitys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "web-applikaatiot", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ohjelmistoturvallisuuden parantaminen staattisella analyysill\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201805052469", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": null, "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2018-05-05T08:20:55Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|