fullrecord |
[{"key": "dc.contributor.advisor", "value": "Luoma, Eetu", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Palonen, Teija", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kallioniemi, Juho", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-02-04T07:36:09Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-02-04T07:36:09Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/62675", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden Internetin sovellukset n\u00e4hd\u00e4\u00e4n tulevaisuudessa l\u00e4sn\u00e4 kaikkialla ymp\u00e4rist\u00f6ss\u00e4mme, helpottaen ihmisten arkea ja ty\u00f6t\u00e4. Ennen kuin kuluttajat voivat hyv\u00e4ksy\u00e4 t\u00e4llaisen jokaiseen el\u00e4m\u00e4nalueeseen ulottuvan teknologian, tulee valmistajien ansaita heid\u00e4n luottamuksensa teknologian turvallisuuteen. Turvallisuus on kuitenkin j\u00e4\u00e4nyt kehityksess\u00e4 sivurooliin, vaikka esineiden Internetin riskit kuluttajien turvallisuudelle ja yksityisyydelle ovat huomattavia. T\u00e4ss\u00e4 kirjallisuuskatsauksena toteutettavassa tutkielmassa esineiden Internetin kyberturvallisuutta l\u00e4hestyt\u00e4\u00e4n kuluttajiin kohdistuvien turvallisuusuhkien ja niiden est\u00e4miseen t\u00e4ht\u00e4\u00e4vien keinojen n\u00e4k\u00f6kulmasta. Tutkimuskirjallisuudesta tunnistettiin useita konkreettisia uhkia monenlaisten kyberhy\u00f6kk\u00e4ysten muodossa. N\u00e4ihin lukeutuivat muun muassa palvelunestohy\u00f6kk\u00e4ykset, datainjektio sek\u00e4 salauksen murtamiseen t\u00e4ht\u00e4\u00e4v\u00e4t hy\u00f6kk\u00e4ykset. Suuri osa esineiden Internetin turvallisuusratkaisuista oli kuitenkin esitetty tavoitteina ja konkreettisiakaan keinoja ei yleens\u00e4 oltu suunniteltu erityisesti esineiden Interneti\u00e4 varten. Luottamus oli er\u00e4s kiinnostavimmista turvallisuuden parantamiseen t\u00e4ht\u00e4\u00e4vist\u00e4 keinoista.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The Internet of Things applications are viewed as ubiquitous technologies in our environment in the future. Consumers\u2019 trust in the IoT security should be earner by the manufacturers before they can accept such a pervasive technology in their daily lives. However, security in the development has been severely lacking even though the risks for consumers\u2019 security and privacy are substantial. In this literature review, the cybersecurity of the Internet of Things is approached from the perspective of security threats that affect consumers and the proposed solutions for enhancing the IoT security. Multiple concrete threats, mostly in the form of cyberattacks, were identified in the research literature. These include but are not limited to denial of service attacks, false data injection and cryptanalysis. A large portion of the solutions were presented as objectives and even the concrete methods were often not designed for use in the Internet of Things specifically. One of the most interesting solutions was trust.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-02-04T07:36:09Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-02-04T07:36:09Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "38", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Esineiden Internetin turvallisuus kuluttajaperspektiivist\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201902041389", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "luottamus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksityisyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|