fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "R\u00e4s\u00e4nen, Aleksi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-01-03T12:42:58Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-01-03T12:42:58Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/60868", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden Internetin k\u00e4ytt\u00f6 on ollut pitk\u00e4\u00e4n nousussa ja se on muokannut yhteiskuntaamme monella tavalla. My\u00f6s teollisuus on hy\u00f6dynt\u00e4nyt Esineiden Internetin sovelluksia monella tasolla. Haittavaikutuksina on kuitenkin ilmennytpaljonerilaisiatietoturvauhkia,jotkaovatmotivoineett\u00e4t\u00e4tutkielmaa. Tutkielma on suoritettu kirjallisuuskatsauksena ja sen tarkoituksena on selvitt\u00e4\u00e4 teollisen Esineiden Internetin oleelliset tietoturvauhkat, niihinliittyv\u00e4t haasteet ja ratkaisut. Tutkielmassa selvi\u00e4\u00e4, ett\u00e4 teollisen Esineiden Internetin suuret verkot jaj\u00e4rjestelm\u00e4tintegroivatsis\u00e4\u00e4ns\u00e4niinpaljonerilaisiaosioita,ett\u00e4 niit\u00e4 koskettaa suuri m\u00e4\u00e4r\u00e4 perinteisi\u00e4 tietoturvauhkia. T\u00e4m\u00e4 verkkojen ja j\u00e4rjestelmien suuri koko ja heterogeenisyys aiheuttavat suuriahaasteitavahvan tietoturvatason saavuttamiseksi. Haasteita aiheuttaa my\u00f6s laitteiden pienet resurssit ja standardoinnin puute. Vahvojen tietoturvamekanismien implementoiminen on vaikeaa laitteisiin, joiden tietotekniset resurssit ovat pienet. Verkkojen laitteiden heterogeenisyys ja erilaiset standardit laitteissa sek\u00e4 ohjelmistoissa johtavat my\u00f6s usein tietoturva-aukkojensyntyyn.Ratkaisut on viel\u00e4 kirjallisuuden mukaan tulevaisuuden tutkimuksen aiheena, mutta joitain ratkaisuja on jo kehitetty. Laitetason ratkaisuja on ARM TrustZone ja turvallisuusohjain, mutta my\u00f6s henkil\u00f6st\u00f6n koulutusta pidet\u00e4\u00e4n eritt\u00e4in oleellisena ratkaisuna.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The use of Internet of Things (IoT) has been rising for a long time and it has\nshaped our society in many ways. Industry has also utilized the applications of\nIoT on many levels. There are numerous information security threats regarding\nindustrial IoT which have motivated this study. This study is a literature review\nand it\u2019s goal is to examine industrial IoT\u2019s information security threats,\nchallenges regarding them and solutions. Study shows that industrial IoT\u2019s big\nnetworks and systems integrate so many things in them that there is a\nsubstantial amount of information security threats regarding them.\nHeterogeneity and size of these networks and systems cause big challenges in\norder to achieve strong information security mechanisms. Lack of\nstandardization and small size of devices also cause challenges. It\u2019s very\nchallenging to implement strong information security mechanisms to devices\nthat have little computing resources. Heterogeneity of networks and different\nstandards on devices and programs also lead to vulnerabilities. According to\nliterature, solutions are still yet to be researched in the future. Though there are\nsome solutions developed already. ARM TrustZone and security controller are\nhardware-level solutions but proper training of employees is kept as a very\nrelevant solution.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-01-03T12:42:58Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-01-03T12:42:58Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kerrosarkkitehtuuri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hy\u00f6kk\u00e4ysrajapinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Esineiden internetin tietoturvauhkat teollisuuden yrityksiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201901031040", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|