fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "S\u00f6derholm, Antti-Ilari", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-12-05T07:33:32Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-12-05T07:33:32Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/60491", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ta\u0308ma\u0308 tutkielma ka\u0308sittelee Euroopan Unionin (EU) verkko- ja tietoja\u0308rjestelmien turvallisuusdirektiivia\u0308 (NIS-direktiivi), EU:n ta\u0308lla\u0308 hetkella\u0308 tai tulevaisuudessa kohtaamia uhkia seka\u0308 haasteita, joita eurooppalaiseen, NIS-direktiiviin pohjautuvaan kyberturvallisuusyhteistyo\u0308ho\u0308n liittyy. Tutkimus tehtiin kvalitatiivisena tutkimuksena, pragmaattisella maailmankuvalla ja tapaustutkimuksena. Tutkimuksen tarkoituksena oli selvitta\u0308a\u0308 ta\u0308ma\u0308n hetken eurooppalaisen kyberturvallisuusyhteistyo\u0308n kuvaa. Na\u0308in ollen, tutkimus keskittyi (i) lo\u0308yta\u0308ma\u0308a\u0308n potentiaaliset uhkat, (ii) selvitta\u0308a\u0308 EU:n tavoitteet direktiiville seka\u0308 (iii) ka\u0308sitella\u0308 esiintuotuja yhteistyo\u0308n haasteita. Tutkimuksen tulokset osoittivat, etta\u0308 uhkakuva on alati laajentuva ja kehittyva\u0308, johon NIS- direktiivia\u0308 tarvitaan turvaamaan eurooppalainen digitaalinen markkinapaikka (Digital Single Market). EU:n tavoitteena on varmistaa yhteinen korkeatasoinen verkko- ja tietoja\u0308rjestelmien turvallisuus koko unionissa. Kriittinen infrastruktuuri ta\u0308ytyy suojata niin julkisella kuin yksityisella\u0308 puolella. Ta\u0308ma\u0308 koskettaa keskeisten palvelujen tarjoajia (KPT) ja digitaalisten palvelujen tarjoajia (DPT). Yhteistyo\u0308n ympa\u0308rilla\u0308 on haasteita, kuten vaihtelevat la\u0308hestymistavat, erilainen maturiteettitaso, luottamuksen puute, poikkeamien raportointi ei ole riitta\u0308va\u0308n selkea\u0308a\u0308, KPT:t ja DPT:t ma\u0308a\u0308ritella\u0308a\u0308n eri tavoin koko unionissa, direktiivin noudattamisen velvoitteet ja siita\u0308 seuraavat sanktiot vaihtelevat seka\u0308 joitakin tietoturvan kannalta merkitta\u0308via\u0308 puolia on ja\u0308tetty direktiivin ulkopuolelle. Haasteista huolimatta direktiivi on tarpeellinen, jotta tulevaisuuden uhkia vastaan voidaan ja\u0308senmaita puolustaa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis discusses of the European Union (EU) Directive on Security of Network and Information Systems (NIS Directive), threats of cyber space that the EU embrace or would have to overcome in the future, and challenges around European cyber security cooperation in accordance with the NIS Directive. The research was conducted with qualitative research design, pragmatic worldview, and the desired strategy of inquiry was a case study. Purpose of the research was to provide a view on the current state of European cyber security cooperation. Thereby, the research was focused onto (i) find out what potential threats there are, (ii) what are the EU\u2019s objectives of the NIS Directive, and (iii) what challenges are enunciated of the cooperation. Results indicated that threat landscape is broad and evolving where the NIS Directive is required to safeguard European Digital Single Market. Objective of the NIS Directive is to boost and reach a high common level of security of network and information systems across the EU. Critical infrastructure must be secured against threats, both on public and private sector. This concerns Operators of Essential Services (OES) and Digital Service Providers (DSPs). There are challenges around the cooperation, such as varying approaches, different maturity level, lack of trust, incident reporting is not clear enough, OES and DSPs are differently identified across the EU, compliance and sanctions vary, and some elements are left out of scope of the NIS Directive. Despite the challenges, the NIS Directive is needed in defending Member States against future threats.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-12-05T07:33:32Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-12-05T07:33:32Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "102", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "NIS Directive", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "European Union", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "critical infrastructure", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "operators of essential services", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "digital service providers", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Threats and challenges around European cyber security cooperation in the context of the European Union directive on security of network and information systems", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201812055004", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haasteet (ongelmat)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yhteisty\u00f6", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "challenges", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cooperation (general)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber attacks", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "threats", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|