fullrecord |
[{"key": "dc.contributor.advisor", "value": "Koskelainen, Tiina", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Piril\u00e4, Mikko", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-05-08T06:27:38Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-05-08T06:27:38Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/63776", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi k\u00e4ytt\u00e4j\u00e4n manipulaatiota, (engl. social\nengineering) tarkemmin sanottuna miten se ilmenee k\u00e4yt\u00e4nn\u00f6ss\u00e4 ja miksi se on\nniin tehokas tapa tehd\u00e4 tietoturvahy\u00f6kk\u00e4ys, sek\u00e4 miten siihen voidaan varautua.\nK\u00e4ytt\u00e4j\u00e4n manipulaatio -hy\u00f6kk\u00e4yksess\u00e4 pyrit\u00e4\u00e4n p\u00e4\u00e4sem\u00e4\u00e4n k\u00e4siksi esimerkiksi\norganisaation tietokantaan tai yksityisen ihmisen tietoihin. Hy\u00f6kk\u00e4ys kohdistuu\ntietokoneiden ja muiden laitteiden sijasta k\u00e4ytt\u00e4j\u00e4\u00e4n, jota hy\u00f6kk\u00e4\u00e4j\u00e4 pyrkii\nmanipuloimaan saadakseen haluamansa. N\u00e4m\u00e4 manipulaatiohy\u00f6kk\u00e4ykset\nperustuvat psykologiaan ja ihmisten perusominaisuuksiin, tehden niist\u00e4\ntehokkaita ja vaikeita ja joissain tilanteissa mahdottomia havaita ennen kuin on\nmy\u00f6h\u00e4ist\u00e4. Tutkielmassa kuvaillaan muun muassa k\u00e4ytt\u00e4j\u00e4n manipulaatioon\nliittyvi\u00e4 erilaisia psykologisia tekij\u00f6it\u00e4, hy\u00f6kk\u00e4ysmetodeja ja hy\u00f6kk\u00e4ysten\nperuspiirteit\u00e4. T\u00e4m\u00e4 tutkielma pyrkii avaamaan syit\u00e4 sille, miksi k\u00e4ytt\u00e4j\u00e4n\nmanipulaatio on suuri ja verrattain tuntematon uhka. K\u00e4ytt\u00e4j\u00e4n manipulointi on\nsuuri ongelma, koska uhri voi olla yksityinen henkil\u00f6 tai yritys ja menetykset\nkummassakin tapauksessa voivat olla huomattavia. Esimerkiksi internet on\npullollaan k\u00e4ytt\u00e4j\u00e4n manipulointiin pyrkivi\u00e4 pop up -mainoksia ja\nhuijauss\u00e4hk\u00f6posteja. Yksi suurimmista ongelmista liittyen k\u00e4ytt\u00e4j\u00e4n\nmanipulaation on kyseisten hy\u00f6kk\u00e4ysten/huijausten tunnistaminen. Siksi onkin\nt\u00e4rke\u00e4\u00e4 tutkia aihetta ja ottaa selville, miten k\u00e4ytt\u00e4j\u00e4n manipuloinnista syntyvi\u00e4\nmenetyksi\u00e4 ja haittoja saadaan v\u00e4hennetty\u00e4, sek\u00e4 millaiset hy\u00f6kk\u00e4ykset ovat\nkaikista menestyksekk\u00e4impi\u00e4. T\u00e4m\u00e4n kirjallisuuskatsauksen tuloksena on\nkatsaus k\u00e4ytt\u00e4j\u00e4n manipulaatiosta, sek\u00e4 siit\u00e4 miksi se on tehokas hy\u00f6kk\u00e4ystapa\nja miten mahdollisesti sit\u00e4 voitaisiin ehk\u00e4ist\u00e4. Tutkielman tuloksista voidaan\np\u00e4\u00e4tell\u00e4, ett\u00e4 k\u00e4ytt\u00e4j\u00e4n manipulaatio ei saa sen vaatimaa huomiota tietoturvan\nsuhteen, sek\u00e4, ett\u00e4 sen aiheuttamat vahingot vuosittain ovat massiiviset. Ainoa\ntapa p\u00e4\u00e4st\u00e4 n\u00e4ist\u00e4 hy\u00f6kk\u00e4yksist\u00e4 eroon on loppujen lopuksi valistaa ihmisi\u00e4\nniiden vaaroista, mutta hy\u00f6kk\u00e4ysten monimuotoisuuden vuoksi se on\nk\u00e4yt\u00e4nn\u00f6ss\u00e4 mahdotonta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In this report, we will go through social engineering and how it manifests itself\nin practice and why it is such an effective way to attack as well as how can one\nprepare against such attack. In social engineering attacks the attacker aims to acquire access for example to an organisations database or private citizens personal\ninformation. Instead of focusing on computers or other electronic devices, the\nattack targets the user, which the attacker attempts to manipulate to acquire what\n(s)he wants. These social engineering attacks are based on human psychology\nand basic human characteristics, making them effective and difficult and in some\ncases impossible to detect before it is too late. This report describes the different\npsychological factors related to social engineering as well as different attack\nmethods and different features that the attacks hold. This report aims to clarify,\nwhy social engineering is such an immediate and rather unknown threat. For\nexample, the internet is filled with pop up ads and spam that aim to manipulate\nthe user. One of the biggest problems regarding social engineering is the detection of the attacks and scams. Thus, it is important to research and find out how\nthe losses accumulating from social engineering can be reduced and what kinds\nof attacks are the most successful. The result of this report is an examination of\nsocial engineering and why it is such an effective avenue of attack as well as how\nit could be prevented. From the results we can conclude, that social engineering\ndoes not get the attention it needs regarding information security and that the\nlosses it causes are massive. In the end the only real way to get rid of these attacks\nis to educate people about the dangers of social engineering, but due to the complexity and multiple different methods, it is impossible in practice.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-05-08T06:27:38Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-05-08T06:27:38Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "K\u00e4ytt\u00e4j\u00e4n manipulaation ehk\u00e4isy", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201905082454", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "manipulaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "psykologiset tekij\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|