fullrecord |
[{"key": "dc.contributor.advisor", "value": "Palonen, Teija", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tiainen, Tatu", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-12-19T11:26:25Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-12-19T11:26:25Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/60688", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kandidaatintutkielma k\u00e4sittelee aihetta \u201dTy\u00f6ntekij\u00e4 yrityksen tietoturvariskin\u00e4\u201d. Tutkielma tarkastelee keinoja, jotka johtavat tietoturvauhan syntymiseen ty\u00f6ntekij\u00e4n toimesta. Tutkielma rajaa ty\u00f6ntekij\u00e4n aiheuttamat tietoturvariskit tahattomasti ja tahallisesti aiheutettuihin. Tieturvariskien lis\u00e4ksi tutkielmassa tarkastellaan riskien ehk\u00e4isy- ja torjuntakeinoja, jotka ollaan jaettu teknisiin ohjaimiin ja ei-teknisiin ohjaimiin. Ty\u00f6ntekij\u00f6iden aiheuttamat tahattomat tai tahalliset tietoturvariskit ovat kasvava uhka yrityksen liiketoiminnalle, luotettavuudelle sek\u00e4 uskottavuudelle. Yrityksen ulkopuoliset uhat, kuten esimerkiksi kyberrikolliset, ovat my\u00f6s konkreettisia uhkia, mutta t\u00e4ss\u00e4 tutkielmassa tietoturvauhkaa tarkastellaan vain ty\u00f6ntekij\u00e4n n\u00e4k\u00f6kulmasta. Motiiveilla ja toteutustavoilla on t\u00e4rke\u00e4 rooli ty\u00f6ntekij\u00e4n suorittamassa tietoturvarikkeess\u00e4, sill\u00e4 se m\u00e4\u00e4rittelee onko kyseess\u00e4 tahallinen vai tahaton toimenpide. T\u00e4st\u00e4 syyst\u00e4 motiivien ymm\u00e4rt\u00e4minen ja tiedostaminen mahdollistaa niin tahattomien kuin tahallisten tietoturvariskien tuomien vahinkojen minimoimisen ja ennakoimisen. Ty\u00f6ntekij\u00f6iden aiheuttamaa tietoturvauhkaa pystyt\u00e4\u00e4n ehk\u00e4isem\u00e4\u00e4n hy\u00f6dynt\u00e4m\u00e4ll\u00e4 teknisi\u00e4 ja ei-teknisi\u00e4 ohjaimia. Tekniset ohjaimet k\u00e4sitt\u00e4v\u00e4t palomuurit ja tunkeutumisenestoj\u00e4rjestelm\u00e4t. Ei-tekniset ohjaimet kattavat esimerkiksi psykologisen arvioinnin. Kandidaatintutkielma on toteutettu kirjallisuuskatsauksena.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis inspects the following topic; \u201dEmployee as an security threat\u201d. The study adresses different ways in which the employee compromises the employers information security. In this study, the means are restricted to two categories; unintentional and deliberate. Besides the means and potential risks that the employee causes, this study inspects security measures, that can be apply to prevent and fend off information security risks in organizations. Intentional and unintentional security threats caused by employee are an growing threat to compainies business, realibility and credibility. Threats emerging outside the company, such as cybercriminal are very concrete threat, this study focuses mainly on the employers point of view. Intentions and motives are important factor, because these determine is the threat intentional or unintentional. For this reason, the understanding and awareness of motives and intentions allows to minimize and anticipate the damage caused by deliberate or unintentional behavior to negleg information security. Employee security risks can be prevented by using technical and nontechnical drivers. Technical drivers include firewalls and intrusion detection systems. Non-technical drivers include such methods as psychological evaluation. This bachelor\u2019s thesis is conducted as an literature review.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-12-19T11:26:25Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-12-19T11:26:25Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Ty\u00f6ntekij\u00e4 yrityksen tietoturvariskin\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201812195228", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ty\u00f6ntekij\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "p\u00e4\u00e4synvalvonta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|