fullrecord |
[{"key": "dc.contributor.advisor", "value": "Takala, Arttu", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lipsanen, Tommi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-05-10T11:48:24Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-05-10T11:48:24Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/63882", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Koko yhteiskunnan toiminta voi vaarautua kriittiseen infrastruktuuriin kohdistuvan kyberhy\u00f6kk\u00e4yksen seurauksena. Ukrainassa tapahtui kyberhy\u00f6kk\u00e4ys SCADA-j\u00e4rjestelm\u00e4\u00e4n, jonka seurauksena s\u00e4hk\u00f6t katkesivat yli 200 000 ihmiselt\u00e4 1-6 tunnin ajaksi. T\u00e4m\u00e4 kyseinen hy\u00f6kk\u00e4ys kohdistui SCADA-j\u00e4rjestelm\u00e4\u00e4n. SCADA-j\u00e4rjestelm\u00e4t ovat yhdenlaisia teollisia valvonta- ja ohjausj\u00e4rjestelmi\u00e4. Niit\u00e4 k\u00e4ytet\u00e4\u00e4n muun muassa ohjaamassa ja valvomassa s\u00e4hk\u00f6n- ja vedenjakelun oikeanlaista toimintaa. Ne eroavat osittain k\u00e4ytt\u00f6tarkoitukselta ja toiminnaltaan tavanomaisesta informaatioteknologiasta. SCADA-j\u00e4rjestelm\u00e4\u00e4n kohdistuvasta kyberhy\u00f6kk\u00e4yksest\u00e4 voi seurata merkityksellist\u00e4 vahinkoa ihmisten terveydelle ja turvallisuudelle sek\u00e4 paljon vahinkoa ymp\u00e4rist\u00f6lle, joten kyberturvallisuuden tutkiminen t\u00e4ss\u00e4 kontekstissa on t\u00e4rke\u00e4\u00e4. Tilastot osoittavat, ett\u00e4 SCADA-j\u00e4rjestelmiin kohdistuvien kyberhy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 on kasvanut vuosien saatossa. T\u00e4ss\u00e4 kirjallisuuskatsauksena tehdyss\u00e4 tutkimuksessa perehdyt\u00e4\u00e4n SCADA-j\u00e4rjestelmien kyberturvallisuuteen; sen erityispiirteisiin ja vaatimuksiin tavanomaiseen informaatioteknologiaan verrattuna, j\u00e4rjestelmiin kohdistuviin kyberhy\u00f6kk\u00e4yksiin sek\u00e4 kyberturvallisuuden mahdolliseen parantamiseen. Tutkimuksessa havaittiin, ett\u00e4 SCADA-j\u00e4rjestelmiss\u00e4 on alettu k\u00e4ytt\u00e4m\u00e4\u00e4n osittain samoja teknologioita, kuin tavanomaisessa informaatioteknologiassa. T\u00e4m\u00e4 altistaa SCADA-j\u00e4rjestelm\u00e4t uudenlaisille kyberuhkille ja hy\u00f6kk\u00e4yksille. Lis\u00e4ksi havaittiin, ett\u00e4 kyberturvallisuuden parantamiseksi on monia k\u00e4yt\u00e4nt\u00f6j\u00e4 ja menetelmi\u00e4, joista keskeiseksi nousi esille erilaiset simulaatio- ja mallintamistekniikat. N\u00e4it\u00e4 menetelmi\u00e4 k\u00e4ytett\u00e4ess\u00e4 ja kehitett\u00e4ess\u00e4 t\u00e4ytyy ottaa huomioon SCADA-j\u00e4rjestelmien toiminnan erityisvaatimukset, joita ovat tosiaikaisuus, rajalliset laskentaresurssit sek\u00e4 toiminnan jatkuvuus- ja turvallisuusvaatimukset.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The functioning of whole society can be endangered by a cyberattack on critical infrastructure. In Ukraine there was a cyberattack, which resulted blackout for 1-6 hours to over 200,000 people. This attack targeted SCADA-system. SCADAsystems are one type of industrial control system and they are used, among other things, to control and monitor the intrinsic performance of electricity and water supply. They differ in part from the purpose and function of traditional information technology. The cyberattack targeted to SCADA-system can have significant damage to human health and safety and deal great damage to the environment, so it is important to examine cyber-security in this context. Statistics show that the number of cyberattacks targeted to SCADA-systems has increased over the years. This literature review explores the cybersecurity of SCADA-systems; its special features and requirements compared to traditional information technology, cyberattacks on systems, and potential improvements in cybersecurity of SCADA-systems. It was noticed during the examination that SCADA-systems have started to use the same technologies in part as in traditional information technology. This exposes SCADA-systems to new kinds of cyber threats and attacks. In addition, it was found that there are many practices and methods for improving cybersecurity. During the examination it was noticed that pivotal methods for improving cyber security of SCADA-systems are simulation and modeling techniques. When using and developing these methods, it must be considered that there are specific requirements in SCADAsystems functioning, such as the real-time operating, the limited computing resources, and the continuity and safety requirements for functioning.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-05-10T11:48:23Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-05-10T11:48:24Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "SCADA-j\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kriittinen infrastruktuuri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "SCADA-j\u00e4rjestelmien kyberturvallisuuden erityispiirteet ja parantaminen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201905102538", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|