fullrecord |
[{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kangas, Matias", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-12-14T07:05:19Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-12-14T07:05:19Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/60603", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ajoneuvoihin tulee jatkuvasti lis\u00e4\u00e4 erilaisia elektronisia laitteita, kuten ajotietokoneita\nja telemetrialaitteita. N\u00e4m\u00e4 laitteet mahdollistavat uusia tapoja ty\u00f6skennell\u00e4 ja parantavat\nmy\u00f6s ty\u00f6skentelyn tehokkuutta, mutta voivat lis\u00e4ksi johtaa ongelmiin. Lis\u00e4\u00e4ntyv\u00e4t\nlaitteet ja langattomat yhteydet nostavat my\u00f6s traktorin riski\u00e4 joutua kyberhy\u00f6kk\u00e4yksen kohteeksi.\n\nT\u00e4m\u00e4n ty\u00f6n tarkoituksena on kuvata mink\u00e4laisia kyberturvallisuusuhkia nykyaikaiseen traktoriin\nkohdistuu. Tutkimuksen tuloksena on raportti havaituista kyberturvallisuusuhista ja\nviitekehys, jota voidaan k\u00e4ytt\u00e4\u00e4 muissa kyberturvallisuuskartoituksissa.\n\nTutkimuksen teoriaosuudessa tarkastellaan kyberturvallisuutta ja kyberfyysisi\u00e4 j\u00e4rjestelmi\u00e4.\nLis\u00e4ksi tutustutaan kyberfyysisiss\u00e4 j\u00e4rjestelmiss\u00e4 k\u00e4ytett\u00e4viin automaatiov\u00e4yliin ja muihin\najoneuvoihin. Teoriaosuus tuo my\u00f6s ilmi, mit\u00e4 uhkia ajoneuvoihin kohdistuu sek\u00e4 mit\u00e4 ovat\ntestaaminen ja uhkien mallintaminen. Tutkielman empiirinen osuus pit\u00e4\u00e4 sis\u00e4ll\u00e4\u00e4n uhkien\nkartoituksen, niiden testaamisen ja prosessin kuvauksen.\n\nTutkimuksen perusteella traktoreita kohtaan kohdistuu tulevaisuudessa suurempi riski joutua\nkyberhy\u00f6kk\u00e4yksen kohteeksi. Ajoneuvossa olevien tietokoneiden ja niiden langattomat yhteydet\nkasvattavat hy\u00f6kk\u00e4yspinta-alaa ja n\u00e4in ollen my\u00f6s mahdollisen hy\u00f6kk\u00e4yksen riski\u00e4.\nTulevaisuudessa kyberfyysisten j\u00e4rjestelmien suojaamiseen tulee kiinnitt\u00e4\u00e4 enemm\u00e4n huomiota.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The number of electronic devices in vehicles is growing fast. Telemetry devices\nand electronic control units also have more and more connectivity. These devices and their\nnew features make working and driving easier and more effective, but can also lead to new\nkind of problems. The devices with increasing connectivity raise the risk of cyber attacks\nagainst the vehicle.\n\nThe main goal of this thesis is to find out what kind of cyber security threats a modern tractor\nfaces. The result of the research is a report about the threats and findings and a framework\nthat describes how to conduct this kind of a cyber security review to a cyber-physical system.\n\nIn the theory section of this thesis, we will look at the definition of cyber security and find\nout what cyber-physical systems are. We will also look at different buses inside a modern\nvehicle and what kind of threats they may face. The theory section also explains what testing\nis and what threat modeling means. The empirical part of the thesis will show, how the threat\nmodeling was done in practice, how the tractor was tested while also explaining the process\nitself.\n\nAs result of the research, we can say, that in the future, vehicles are more and more prone\nto cyber attacks. The ever-growing number of computers and their wireless systems enlarges\nthe attack surface of the vehicle and therefore the risk of cyber attacks. More resources must\nbe designated to designing secure systems, in order to make vehicles safer.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-12-14T07:05:19Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-12-14T07:05:19Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "72", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Traktorit ja kyberturvallisuus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201812145113", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "traktorit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ajoneuvot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "elektroniikkalaitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "v\u00e4yl\u00e4t (tietotekniikka)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|