Eettinen hakkerointi osana järjestelmän tietoturvaa

Yhteiskunnan siirtyessä koko ajan kohti tietoyhteiskuntaa yhä useammat toiminnot tapahtuvat verkon välityksellä. Tämä on nostanut erilaisten hyökkäysten määrää ja pakottaa yritykset ja organisaatiot panostamaan tietoturvallisuuteensa. Yksi parhaista tavoista vastata tähän haasteeseen on käyttää eett...

Full description

Bibliographic Details
Main Author: Hellberg, Jan
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2019
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/64569
_version_ 1826225807760031744
author Hellberg, Jan
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Hellberg, Jan Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Hellberg, Jan Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Hellberg, Jan
datasource_str_mv jyx
description Yhteiskunnan siirtyessä koko ajan kohti tietoyhteiskuntaa yhä useammat toiminnot tapahtuvat verkon välityksellä. Tämä on nostanut erilaisten hyökkäysten määrää ja pakottaa yritykset ja organisaatiot panostamaan tietoturvallisuuteensa. Yksi parhaista tavoista vastata tähän haasteeseen on käyttää eettistä hakkerointia. Tässä tutkielmassa pyritään selvittämään mitä eettinen hakkerointi on, miten sitä tehdään ja millaisia tuloksia sillä saavutetaan. Tutkielma on toteutettu kirjallisuuskatsauksena. Tutkielmassa päädyttiin tuloksiin, että eettiselle hakkerille on tarkat kriteerit mitkä on täytettävä ja hänellä on käytössään monenlaisia työkaluja. Tutkielmassa todettiin myös, että eettisellä hakkeroinnilla saavutetaan tarkkoja tuloksia ja se on tärkeä osa nykyajan tietoturvaa. The continuing rise of digitalization forces even more services to be conducted via internet. This raises the amount of attacks against these systems and forces companies and organizations to put more emphasis on their information security. One of the best ways to achieve this is to use ethical hacking. This thesis aims to answer the following questions: what is ethical hacking, how is it done and what results does it get? This thesis was done as a literature review. This thesis provided following results: ethical hackers must fulfil multiple criteria and he/she has a lot of tools at his disposal. The thesis also concluded that ethical hacking provides accurate results and it is an essential part of todays information security.
first_indexed 2019-08-19T08:21:38Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Makkonen, Pekka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hellberg, Jan", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-13T06:04:56Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-13T06:04:56Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64569", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Yhteiskunnan siirtyess\u00e4 koko ajan kohti tietoyhteiskuntaa yh\u00e4 useammat toiminnot tapahtuvat verkon v\u00e4lityksell\u00e4. T\u00e4m\u00e4 on nostanut erilaisten hy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4\u00e4 ja pakottaa yritykset ja organisaatiot panostamaan tietoturvallisuuteensa. Yksi parhaista tavoista vastata t\u00e4h\u00e4n haasteeseen on k\u00e4ytt\u00e4\u00e4 eettist\u00e4 hakkerointia. T\u00e4ss\u00e4 tutkielmassa pyrit\u00e4\u00e4n selvitt\u00e4m\u00e4\u00e4n mit\u00e4 eettinen hakkerointi on, miten sit\u00e4 tehd\u00e4\u00e4n ja millaisia tuloksia sill\u00e4 saavutetaan. Tutkielma on toteutettu kirjallisuuskatsauksena. Tutkielmassa p\u00e4\u00e4dyttiin tuloksiin, ett\u00e4 eettiselle hakkerille on tarkat kriteerit mitk\u00e4 on t\u00e4ytett\u00e4v\u00e4 ja h\u00e4nell\u00e4 on k\u00e4yt\u00f6ss\u00e4\u00e4n monenlaisia ty\u00f6kaluja. Tutkielmassa todettiin my\u00f6s, ett\u00e4 eettisell\u00e4 hakkeroinnilla saavutetaan tarkkoja tuloksia ja se on t\u00e4rke\u00e4 osa nykyajan tietoturvaa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The continuing rise of digitalization forces even more services to be conducted via internet. This raises the amount of attacks against these systems and forces companies and organizations to put more emphasis on their information security. One of the best ways to achieve this is to use ethical hacking. This thesis aims to answer the following questions: what is ethical hacking, how is it done and what results does it get? This thesis was done as a literature review. This thesis provided following results: ethical hackers must fulfil multiple criteria and he/she has a lot of tools at his disposal. The thesis also concluded that ethical hacking provides accurate results and it is an essential part of todays information security.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-06-13T06:04:56Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-13T06:04:56Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "27", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "penetraatiotestaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Eettinen hakkerointi osana j\u00e4rjestelm\u00e4n tietoturvaa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906133173", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "eettisyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_64569
language fin
last_indexed 2025-02-18T10:55:44Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/4c7dc1a6-a9b2-4ce0-ba12-b3edd56913d3\/download","text":"URN:NBN:fi:jyu-201906133173.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Hellberg, Jan Eettinen hakkerointi osana järjestelmän tietoturvaa penetraatiotestaus Tietojärjestelmätiede Information Systems Science 601 hakkerointi hakkerit tietoturva eettisyys
title Eettinen hakkerointi osana järjestelmän tietoturvaa
title_full Eettinen hakkerointi osana järjestelmän tietoturvaa
title_fullStr Eettinen hakkerointi osana järjestelmän tietoturvaa Eettinen hakkerointi osana järjestelmän tietoturvaa
title_full_unstemmed Eettinen hakkerointi osana järjestelmän tietoturvaa Eettinen hakkerointi osana järjestelmän tietoturvaa
title_short Eettinen hakkerointi osana järjestelmän tietoturvaa
title_sort eettinen hakkerointi osana järjestelmän tietoturvaa
title_txtP Eettinen hakkerointi osana järjestelmän tietoturvaa
topic penetraatiotestaus Tietojärjestelmätiede Information Systems Science 601 hakkerointi hakkerit tietoturva eettisyys
topic_facet 601 Information Systems Science Tietojärjestelmätiede eettisyys hakkerit hakkerointi penetraatiotestaus tietoturva
url https://jyx.jyu.fi/handle/123456789/64569 http://www.urn.fi/URN:NBN:fi:jyu-201906133173
work_keys_str_mv AT hellbergjan eettinenhakkerointiosanajärjestelmäntietoturvaa