APT – Kohdistettu hyökkäys

The number of cyberattacks have been increasing for a long time. In addition to this, especially in ongoing decade cyberattacks have become better resourced, more advanced and more precisely targeted than before. The goal of these attacks is mainly stealing high value data to gain financial or polit...

Full description

Bibliographic Details
Main Author: Kuhalampi, Matti
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2018
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/58026
_version_ 1826225795074359296
author Kuhalampi, Matti
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Kuhalampi, Matti Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kuhalampi, Matti Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Kuhalampi, Matti
datasource_str_mv jyx
description The number of cyberattacks have been increasing for a long time. In addition to this, especially in ongoing decade cyberattacks have become better resourced, more advanced and more precisely targeted than before. The goal of these attacks is mainly stealing high value data to gain financial or political advantage for example. Usually the perpetrators behind these attacks are different kinds of groups, organisations and even nations. These kind of attacks go by the term “APT“, which stands for advanced persistent threat. This paper tries to answer the question: What is APT and is it possible to stay safe from it? There is no single pivotal matter in defending against an APT but penetration testing, employees’ threat awareness and outbound traffic monitoring proved their significance. Kyberhyökkäysten määrä on ollut kasvussa viime vuosina. Tämän lisäksi varsinkin kuluvalla vuosikymmenellä kyberhyökkäyksistä on tullut entistä paremmin resurssoituja, edistyneempiä ja kohdistetumpia. Näiden hyökkäysten tavoitteena on pääasiallisesti arvokkaan tiedon varastaminen huomaamatta, jolla saavutetaan esimerkiksi taloudellinen tai poliittinen hyöty tai etulyöntiasema. Taustalla on useasti erilaiset ryhmät, organisaatiot ja jopa valtiot. Tällaisista hyökkäyksistä käytetään termiä APT, joka tulee sanoista advanced persistent threat. Tutkielma pyrkii vastaamaan kysymykseen: Mikä on APT ja voiko siltä suojautua? Yksittäistä ratkaisevaa tekijää suojautumisen osalta ei ole, mutta merkittäviksi asioiksi osoittautuvat penetraatiotestaus, työntekijöiden uhkatietoisuus sekä ulospäin lähtevän verkkoliikenteen tarkkailu.
first_indexed 2024-09-11T08:49:23Z
format Kandityö
fullrecord [{"key": "dc.contributor.advisor", "value": "Kaijanaho, Antti-Juhani", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kuhalampi, Matti", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-05-21T05:48:09Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-05-21T05:48:09Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/58026", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The number of cyberattacks have been increasing for a long time. In addition\nto this, especially in ongoing decade cyberattacks have become better resourced,\nmore advanced and more precisely targeted than before. The goal of these\nattacks is mainly stealing high value data to gain financial or political advantage for\nexample. Usually the perpetrators behind these attacks are different kinds of groups,\norganisations and even nations. These kind of attacks go by the term \u201cAPT\u201c, which\nstands for advanced persistent threat. This paper tries to answer the question: What\nis APT and is it possible to stay safe from it? There is no single pivotal matter in\ndefending against an APT but penetration testing, employees\u2019 threat awareness and outbound traffic monitoring proved their significance.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberhy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 on ollut kasvussa viime vuosina. T\u00e4m\u00e4n lis\u00e4ksi\nvarsinkin kuluvalla vuosikymmenell\u00e4 kyberhy\u00f6kk\u00e4yksist\u00e4 on tullut entist\u00e4\nparemmin resurssoituja, edistyneempi\u00e4 ja kohdistetumpia. N\u00e4iden hy\u00f6kk\u00e4ysten tavoitteena\non p\u00e4\u00e4asiallisesti arvokkaan tiedon varastaminen huomaamatta, jolla saavutetaan\nesimerkiksi taloudellinen tai poliittinen hy\u00f6ty tai etuly\u00f6ntiasema. Taustalla\non useasti erilaiset ryhm\u00e4t, organisaatiot ja jopa valtiot. T\u00e4llaisista hy\u00f6kk\u00e4yksist\u00e4\nk\u00e4ytet\u00e4\u00e4n termi\u00e4 APT, joka tulee sanoista advanced persistent threat. Tutkielma pyrkii\nvastaamaan kysymykseen: Mik\u00e4 on APT ja voiko silt\u00e4 suojautua? Yksitt\u00e4ist\u00e4 ratkaisevaa\ntekij\u00e4\u00e4 suojautumisen osalta ei ole, mutta merkitt\u00e4viksi asioiksi osoittautuvat\npenetraatiotestaus, ty\u00f6ntekij\u00f6iden uhkatietoisuus sek\u00e4 ulosp\u00e4in l\u00e4htev\u00e4n verkkoliikenteen\ntarkkailu.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2018-05-21T05:48:09Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-05-21T05:48:09Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "APT \u2013 Kohdistettu hy\u00f6kk\u00e4ys", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201805212686", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_58026
language fin
last_indexed 2025-02-18T10:56:17Z
main_date 2018-01-01T00:00:00Z
main_date_str 2018
publishDate 2018
record_format qdc
source_str_mv jyx
spellingShingle Kuhalampi, Matti APT – Kohdistettu hyökkäys Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus kyberrikollisuus hyökkäys
title APT – Kohdistettu hyökkäys
title_full APT – Kohdistettu hyökkäys
title_fullStr APT – Kohdistettu hyökkäys APT – Kohdistettu hyökkäys
title_full_unstemmed APT – Kohdistettu hyökkäys APT – Kohdistettu hyökkäys
title_short APT – Kohdistettu hyökkäys
title_sort apt kohdistettu hyökkäys
title_txtP APT – Kohdistettu hyökkäys
topic Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus kyberrikollisuus hyökkäys
topic_facet 602 Mathematical Information Technology Tietotekniikka hyökkäys kyberrikollisuus kyberturvallisuus
url https://jyx.jyu.fi/handle/123456789/58026 http://www.urn.fi/URN:NBN:fi:jyu-201805212686
work_keys_str_mv AT kuhalampimatti aptkohdistettuhyökkäys