fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kaasalainen, Viljami", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-09-21T05:34:16Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-09-21T05:34:16Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/59608", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Lohkoketjut ovat teknologiana uusi ilmi\u00f6 ja ainakin toistaiseksi useimmille t\u00e4ysin tuntematon termi. Lohkoketjuista puhutaan usein hyvin positiiviseen s\u00e4vyyn maailmaa mullistavana teknologiana. K\u00e4sitteen ymp\u00e4rille on muodostunut eritt\u00e4in paljon keskustelua, josta seurauksena usein on se, ettei asiaa muisteta tarkastella tarpeeksi kriittisesti. Siksi t\u00e4ss\u00e4 kandidaatin tutkielmassa k\u00e4sitell\u00e4\u00e4n lohkoketjuteknologiaan liittyvi\u00e4 haavoittuvuuksia, erityisesti lohkoketjuihin kohdistuvia hy\u00f6kk\u00e4yksi\u00e4. Tutkielma on toteutettu kirjallisuuskatsauksena. Ensin tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi lohkoketjuteknologian ominaisuudet ja toiminta periaatteet, mink\u00e4 j\u00e4lkeen siirryt\u00e4\u00e4n k\u00e4sittelem\u00e4\u00e4n kolmea erilaista haavoittuvuutta ja mahdollisia ratkaisuja niihin. Kyseisi\u00e4 haavoittuvuuksia ovat 51 prosentin hy\u00f6kk\u00e4ys, tuplakulutus ja hy\u00f6kk\u00e4ys kolmannen osapuolen palveluun. Tutkielma avaa erilaiset haavoittuvuudet ja niihin liittyv\u00e4t hy\u00f6kk\u00e4ykset yksityiskohtaisesti, mutta varmasti toimivia ratkaisuja kyseisiin ongelmiin ei l\u00f6ydetty. Lohkoketjuteknologia on viel\u00e4 uusi asia ja sen merkitt\u00e4vimm\u00e4t haavoittuvuudet perustuvat niin syv\u00e4lle sen perimm\u00e4isiin toimintaperiaatteisiin, ett\u00e4 niihin tarjotut ratkaisut ovat p\u00e4\u00e4asiassa viel\u00e4 vain ehdotuksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "As a technology, blockchain is a new phenomenon and an unknown term for the most. Discussion about blockchains often has a positive tone and it has been called as a groundbreaking technology. This has caused a vast amount of discussion around the subject, which often leads to a lack of critical examination. That is why this thesis focuses on blockchain technology\u2019s vulnerabilities and especially various attacks concerning it. The thesis was implemented as a systematic literature review. First, it will review the features of blockchain technology comprehensively and after that, three different vulnerabilities and their possible solutions will be addressed. The three vulnerabilities in question are 51 percent attack, doublespending and attack on third-party service. The vulnerabilities are explained in a detailed way, but solutions are lacking practical and working answers. The blockchain technology is still emerging technology and its vulnerabilities are based deep into its core features. That is why the solutions to the vulnerabilities concerned are primarily only suggestions.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Riitta Pitk\u00e4nen (rpitkane@jyu.fi) on 2018-09-21T05:34:16Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-09-21T05:34:16Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "lohkoketjuteknologia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "bitcoin", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kryptovaluutta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "blockchain", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "vulnerability", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cryptocurrency", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Lohkoketjuteknologian haavoittuvuudet", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201809214198", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "virtuaalivaluutta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "maksuv\u00e4lineet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "s\u00e4hk\u00f6inen raha", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|