fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jarnola, Miikka", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-12-20T12:47:16Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-12-20T12:47:16Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/60760", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkimuksen tarkoituksena oli tuottaa tieteellist\u00e4 dataa Bug Bountyn hy\u00f6dyist\u00e4 ja haitoista yrityksille. Tutkimuksella haluttiin avata uutta tutkimuskentt\u00e4\u00e4 Bug Bountyn parissa ja rohkaista yrityksi\u00e4 ottamaan Bug Bounty k\u00e4ytt\u00f6\u00f6n. Tutkimuskysymyksi\u00e4 t\u00e4ss\u00e4 tutkimuksessa oli kolme kappaletta. Ne olivat: Mit\u00e4 hy\u00f6tyj\u00e4 L\u00e4hiTapiolalle on ollut Bug Bountyn k\u00e4ytt\u00f6\u00f6notosta, mit\u00e4 ongelmia ja riskej\u00e4 Bug Bountysta on ollut L\u00e4hiTapiolalle, sek\u00e4 Mit\u00e4 opittiin ja mit\u00e4 vietiin k\u00e4yt\u00e4nt\u00f6\u00f6n? Tutkimus toteutettiin kirjallisuuskatsauksen ja empiirisen tutkimuksen yhdistelm\u00e4n\u00e4. Tutkimustulokset olivat kohtalaisen yksimielisi\u00e4. Haastateltujen mukaan Bug Bounty on selv\u00e4sti auttanut yrityst\u00e4 tuottamaan parempaa tietoturvaa sovelluksilleen. Hy\u00f6tyin\u00e4 n\u00e4htiin positiivinen julkisuus, vapautuneet resurssit ja haavoittuvuuksien konkreettinen v\u00e4hentyminen. Suoranaisia ongelmia ei l\u00f6ytynyt. Riskit olivat potentiaalisia riskej\u00e4, jotka eiv\u00e4t koskaan toteutuneet. N\u00e4m\u00e4 riskit olivat, negatiivinen julkisuus, palveluiden kaatuminen liiallisten k\u00e4ytt\u00e4j\u00e4m\u00e4\u00e4rien takia ja negatiivinen palaute. N\u00e4m\u00e4 riskit n\u00e4htiin geneerisin\u00e4 ja niiden todettiin p\u00e4tev\u00e4n l\u00e4hes kaikkiin yrityksiin. Tutkimustulosten puitteissa tunnistettiin joitain haittoja, mit\u00e4 Bug Bounty aiheutti L\u00e4hiTapiolalle. N\u00e4m\u00e4 haitat voivat aiheutua my\u00f6s muille yrityksille. Niit\u00e4 olivat palveluiden hitaus yhden p\u00e4iv\u00e4n ajan Bug Bounty julkistamisesta, pitk\u00e4 prosessi haavoittuvuuden l\u00f6ytymisen ja sen korjaamisen v\u00e4lill\u00e4, sek\u00e4 kielimuuri, koska L\u00e4hiTapiolan Bug Bounty on kansainv\u00e4linen. Opittuina asioina esille nousivat muun muassa uusi tapa suhtautua tietoturvaan ja sen parempi ymm\u00e4rt\u00e4minen, ammatillisen osaamisen kehittyminen ja kansainv\u00e4lisyyden aiheuttamat erot etiikan ja moraalin rajoissa. Empiirisen osion tulokset vastasivat hyvin pitk\u00e4lti kirjallisuuskatsauksen aikana esitettyj\u00e4 aiempien tutkimusten ja teorioiden tuloksia. T\u00e4m\u00e4n perusteella tulosten voidaan todeta olevan k\u00e4ytett\u00e4vi\u00e4 jatkossa ja ne puoltavat yleist\u00e4 linjaa, jonka mukaan Bug Bountysta on hy\u00f6ty\u00e4 yrityksille. Bug Bountyn k\u00e4ytt\u00f6 on turvallista ja se tuo positiivista mainetta yrityksille. Tulokset ovat my\u00f6s luotettavia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-12-20T12:47:16Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-12-20T12:47:16Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "53", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Bug Bounty", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "CIA", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "penetraatiotestaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Bug Bountyn hy\u00f6dyt tietoturvatestauksessa : tapaustutkimus - L\u00e4hitapiola", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201812205284", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "joukkoistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmistokehitys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|