fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laitinen, Otto", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-04-17T11:30:02Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-04-17T11:30:02Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/63527", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "A\u0308lypuhelimet kehittyva\u0308t jatkuvasti ja niiden ka\u0308ytta\u0308ja\u0308ma\u0308a\u0308ra\u0308t ovat suuressa kasvussa. A\u0308lypuhelimien ka\u0308ytta\u0308ja\u0308ma\u0308a\u0308ra\u0308t ovat kuitenkin houkutelleet alalle huomattavan ma\u0308a\u0308ra\u0308n kyberrikollisuutta. Ta\u0308ma\u0308 tutkielma toteutettiin kirjallisuuskatsauksena, jonka tarkoituksena on vastata kahteen tutkimuskysymykseen, millaisia kyberuhkia a\u0308lypuhelimiin kohdistuu ja milla\u0308 tavoin a\u0308lypuhelimiin kohdistuvilta kyberuhkilta voidaan suojautua? Tutkielmassa ka\u0308vi ilmi, etta\u0308 a\u0308lypuhelimiin kohdistuvien kyberuhkien ma\u0308a\u0308ra\u0308 on jatkuvassa kasvussa ja niiden tehokkuus on parantunut viimeisten vuosien aikana. A\u0308lypuhelimiin kohdistuvista kyberuhkista suurin osa on haittaohjelmia nimelta\u0308 troijalainen. Tutkielmassa selvia\u0308a\u0308 myo\u0308s, etta\u0308 a\u0308lypuhelimiin suunnattujen haittaohjelmien kehitta\u0308jien motiivina on kasvavissa ma\u0308a\u0308rin raha, minka\u0308 takia a\u0308lypuhelimien kyberuhkat suuntautuvat yha\u0308 enemma\u0308n ka\u0308ytta\u0308jien henkilo\u0308kohtaisiin tietoihin ja pankkipalveluihin. Tutkielmassa todetaan, etta\u0308 tehokkain ja yksinkertaisin tapa suojautua kyberuhkia vastaan on ka\u0308ytta\u0308a\u0308 mahdollisimman monimutkaista suojakoodia ja asentaa laitteen ka\u0308ytto\u0308ja\u0308rjestelma\u0308pa\u0308ivitykset mahdollisimman pian niiden julkaisun ja\u0308lkeen. Tutkielmassa kuitenkin ka\u0308y ilmi, etta\u0308 ta\u0308na\u0308 pa\u0308iva\u0308na\u0308 on ta\u0308rkea\u0308a\u0308 ka\u0308ytta\u0308a\u0308 myo\u0308s mobiilitietoturvaa ka\u0308ytta\u0308ja\u0308n yksityisyyden suojaamiseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Smartphones are constantly evolving, and the number of the users is increasing. However, the high number of the smartphone users has attracted a significant amount of cybercrime to the industry. This thesis was conducted as a literature review to answer two research questions, what kind of cyber threats fall on smartphones and how can cyber threats to smartphones be defended? The study revealed that the number of cyber threats to smartphones has been steadily increasing and their efficiency has improved over the last few years. The most popular cyber threat to smartphones is a malicious program called trojan. This thesis also shows that the motive of malware developers has in- creasingly been money, which is why smartphone cyber threats are increasingly targeted to users\u2019 personal information and banking services. This thesis states that the most effective and simple way to protect against cyber threats is to use as complicate security code as possible and installing the system updates right away after they are released. However, the thesis shows that nowadays it is im- portant to use mobile security service to protect user\u2019s privacy.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-04-17T11:30:02Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-04-17T11:30:02Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "\u00c4lypuhelimiin kohdistuvat kyberuhkat ja niilt\u00e4 suojautuminen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201904172210", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lypuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|