fullrecord |
[{"key": "dc.contributor.advisor", "value": "Costin, Andrei", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Nyk\u00e4nen, Riku", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kellom\u00e4ki, Tarmo", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-12T08:24:02Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-12T08:24:02Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64548", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden Internetin (IoT) laitteiden m\u00e4\u00e4r\u00e4 on kasvanut dramaattisesti viime\nvuosina ja arvioiden mukaan laitteiden m\u00e4\u00e4r\u00e4 tulee kasvamaan eksponentiaalisesti\ntulevina vuosina. IoT-liiketoiminnassa IoT-laitteiden skaalautuvuutta ja\nstandardointia on pidetty suurena ongelmana valmistajien n\u00e4k\u00f6kulmasta, mik\u00e4\non osittain vaikuttanut turvallisuuden laiminly\u00f6ntiin.\nTutkimuksessa keskityt\u00e4\u00e4n IoT turvallisuuteen, joka kattaa IoTteknologian,\nkehitt\u00e4misprosessit ja tietoturvaty\u00f6kalut. Tutkimuksessa tarkastellaan\nnykyist\u00e4 IoT:n turvallisuustilannetta, tietoturvallisuusstandardeja ja IoT:n\nvaatimuksia sek\u00e4 turvallisia alalla k\u00e4ytettyj\u00e4 kehitt\u00e4mismenetelmi\u00e4 ja v\u00e4lineit\u00e4.\nT\u00e4t\u00e4 tiet\u00e4myst\u00e4 k\u00e4ytet\u00e4\u00e4n tutkimuksen DSR-prosessissa uuden turvallisuusmallin\nlaatimisessa, joka tukee tutkimusasiakkaan IoT-tietoturvan kehitt\u00e4mist\u00e4.\nTutkimuksen asiakas on RD Velho -yhti\u00f6, joka toimii IoT-liiketoiminnassa.\nRD Velho tuottaa IoT-ratkaisuja, jotka perustuvat Arm Mbed- ja Pelion IoT -\nteknologiaan. Asiakas suhtautuu vakavasti tuotteidensa turvallisuuteen ja haluaa\nvarmistaa sen sek\u00e4 teknologian tasolla, kehityksess\u00e4 ett\u00e4 testauksessa.\nTutkimuksessa keskityt\u00e4\u00e4n tarkastelemaan asiakkaan IoT-tietoturvaa teknisen\nturvallisuuden ja kehityksen turvatoimien nykyisen tiet\u00e4myksen avulla.\nKoska tietoturvatestaus on t\u00e4rke\u00e4 rooli turvallisuustilanteen tarkistamisessa,\nsit\u00e4 k\u00e4sitell\u00e4\u00e4n my\u00f6s t\u00e4ss\u00e4 ty\u00f6ss\u00e4.\nTutkimuksen p\u00e4\u00e4tuotos on asiakkaalle luotu RD Velho IoT Security model\n-turvallisuusmalli, joka esitt\u00e4\u00e4 miten IoT-teknologian ja kehitt\u00e4misprosessin\nturvallisuutta voidaan parantaa asianmukaisten ty\u00f6kalujen tukemana.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The number of Internet of Things (IoT) devices has grown dramatically over the\npast few years and according to estimates the number of devices will increase\nexponentially in the coming years. In IoT business, scalability and standardization\nof IoT devices has been regarded as a major problem by the manufacturers\u2019\npoint of view, which has partly influenced neglecting security.\nThis research focuses on the security of IoT covering IoT technology, development\nprocesses and supporting security tools. The research examines the\nsecurity landscape of today\u2019s IoT, security standards and requirements of IoT\nand secure development methods and tools that are used in the field. This body\nof knowledge is used in the research\u2019s DSR process in formulating a new security\nmodel to support the research client\u2019s IoT security posture enhancements.\nThe client for the research is a company called RD Velho which is in IoT\nbusiness. RD Velho produces IoT solutions that are based on Arm Mbed and\nPelion IoT technology. The client takes seriously the security in its products and\nit wants to verify it in both technology level, development and testing process\nlevel.\nThe research concentrates on examining the client\u2019s IoT security through\nthe lens of current knowledge about technical security and development security.\nSince security testing plays important role in verifying security posture, it is\nalso discussed in this thesis.\nThe main result of this research is \u201cRD Velho IoT Security model\u201d, which\nbrings forward suggestions how to improve the security of the client\u2019s IoT technology\nand development processes with proper security tools.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-06-12T08:24:02Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-12T08:24:02Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "140", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Security model", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security testing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Arm", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "RD Velho IoT Security model : secure technology, process and tools", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906123149", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet of things", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston <a href=\"https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat\">arkistoty\u00f6asemalta</a>.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "<br><br>The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival <a href=\"https://kirjasto.jyu.fi/en/workspaces/facilities\">workstation</a> at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|