Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa

Riskienhallintaa ja riskien arviointia voidaan tarkastella useasta eri näkökulmasta ja sitä ohjaavat useat erilaiset tekijät. Ohjaaviksi tekijöiksi voidaan tunnistaa organisaation strategia, organisaatiokulttuuri, tietoturvapolitiikka sekä erilaiset riskienhallinnan mallit, kuten PMBOK, ISO310...

Full description

Bibliographic Details
Main Author: Takala, Niko
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:fin
Published: 2019
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/64621
_version_ 1826225752111054848
author Takala, Niko
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Takala, Niko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Takala, Niko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Takala, Niko
datasource_str_mv jyx
description Riskienhallintaa ja riskien arviointia voidaan tarkastella useasta eri näkökulmasta ja sitä ohjaavat useat erilaiset tekijät. Ohjaaviksi tekijöiksi voidaan tunnistaa organisaation strategia, organisaatiokulttuuri, tietoturvapolitiikka sekä erilaiset riskienhallinnan mallit, kuten PMBOK, ISO31000 ja IRM. Näiden lisäksi tieto- ja kyberturvallisuuden prosesseja pyritään helpottamaan erilaisilla työkaluilla, kuten ISO27001, VAHTI ja Katakri. Riskienhallinnan mallit pitävät sisällään riskien arvioinnin, mutta käsittelevät arviointiprosessia hyvin pintapuolisesti. Riskien arvioinnin perustuminen arvioijan omien kokemusten ja ajatusten päälle pidetään jossain määrin ongelmallisena. Tutkimus toteutettiin toimeksiantona ja sen tarkoitus oli tarjota tukea riskien arvioinnin prosessin kehittämiseen. Tutkimuksessa pyrittiin paikantamaan toimeksiantajan riskien arviointiprosessin ongelmakohdat ja rakentamaan riskien arvioinnin malli niin, että sen voi yleistää käytettäväksi myös muihin organisaatioihin. Tutkimuksen tulokset osoittavat, että myös todennäköisyyksien ennustamiseen on mahdollista rakentaa sen uskottavuutta tukeva malli, joka ajan kuluessa tarjoaa vankan pohjan riskien arviointiprosessiin. Tutkimus toteutettiin kvalitatiivisena tapaustutkimuksena ja pääasiallinen empiirisen datan keräämiseen käytetty metodi oli kvalitatiivinen semi-strukturoitu haastattelu. Riskien arvioinnin mallista muodostui iteratiivinen malli, joka nojaa olemassa olevaan riskienhallinnan malliin. Mallin tavoitteena oli syventää riskienhallinnan henkilökunnan tietoa organisaation riskeihin liittyen ja sitä kautta intuition vaikutuksen vähentäminen riskien arvioinnissa. Risk management and risk assessment can be viewed from several different angles and they have multiple guiding factors. The organization’s strategy, culture and information security policy, as well as risk management models like PMBOK, ISO31000 and IRM can all be seen as guiding factors. In addition to these, there are multiple toolboxes designed to make it easier to implement these models in everyday actions. Tools like these include ISO27001, VAHTI and Katakri. The models of risk management include risk assessment, but they handle it very superficially. Basing risk assessment on the intuition of the assessor can be seen as a problem. The study was conducted as an assignment and the aim of the study was to provide support for developing the risk assessment process inside the principal organization. The study sought to pinpoint the problems of the risk assessment process in the organization and to build a model that can be generalized outside the organization as well. The results of the study show that it is possible to build a model to support the estimation of the risk probabilities. In time, by using the model the organization is able to build a strong database considering its risks and to use the database as a justification for assigned probabilities. The study was conducted as a qualitative case study and the main data collection method was a qualitative semi-structured interview. The model for risk assessment formed to be an iterative model that bases itself on the existing model. The aim of the model was to provide a better foundation for the risk management professionals to do their work and estimate the risks’ probabilities. Through this foundation it is possible to weaken the effect of intuition in the process or at least provide a good justification for the level of probability of the risks.
first_indexed 2019-08-19T08:21:19Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Niemimaa, Marko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Takala, Niko", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-14T07:55:10Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-14T07:55:10Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64621", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Riskienhallintaa ja riskien arviointia voidaan tarkastella useasta eri na\u0308ko\u0308kulmasta ja sita\u0308 ohjaavat useat erilaiset tekija\u0308t. Ohjaaviksi tekijo\u0308iksi voidaan tunnistaa organisaation strategia, organisaatiokulttuuri, tietoturvapolitiikka seka\u0308 erilaiset riskienhallinnan mallit, kuten PMBOK, ISO31000 ja IRM. Na\u0308iden lisa\u0308ksi tieto- ja kyberturvallisuuden prosesseja pyrita\u0308a\u0308n helpottamaan erilaisilla tyo\u0308kaluilla, kuten ISO27001, VAHTI ja Katakri. Riskienhallinnan mallit pita\u0308va\u0308t sisa\u0308lla\u0308a\u0308n riskien arvioinnin, mutta ka\u0308sitteleva\u0308t arviointiprosessia hyvin pintapuolisesti. Riskien arvioinnin perustuminen arvioijan omien kokemusten ja ajatusten pa\u0308a\u0308lle pideta\u0308a\u0308n jossain ma\u0308a\u0308rin ongelmallisena. Tutkimus toteutettiin toimeksiantona ja sen tarkoitus oli tarjota tukea riskien arvioinnin prosessin kehitta\u0308miseen. Tutkimuksessa pyrittiin paikantamaan toimeksiantajan riskien arviointiprosessin ongelmakohdat ja rakentamaan riskien arvioinnin malli niin, etta\u0308 sen voi yleista\u0308a\u0308 ka\u0308ytetta\u0308va\u0308ksi myo\u0308s muihin organisaatioihin. Tutkimuksen tulokset osoittavat, etta\u0308 myo\u0308s todenna\u0308ko\u0308isyyksien ennustamiseen on mahdollista rakentaa sen uskottavuutta tukeva malli, joka ajan kuluessa tarjoaa vankan pohjan riskien arviointiprosessiin. Tutkimus toteutettiin kvalitatiivisena tapaustutkimuksena ja pa\u0308a\u0308asiallinen empiirisen datan kera\u0308a\u0308miseen ka\u0308ytetty metodi oli kvalitatiivinen semi-strukturoitu haastattelu. Riskien arvioinnin mallista muodostui iteratiivinen malli, joka nojaa olemassa olevaan riskienhallinnan malliin. Mallin tavoitteena oli syventa\u0308a\u0308 riskienhallinnan henkilo\u0308kunnan tietoa organisaation riskeihin liittyen ja sita\u0308 kautta intuition vaikutuksen va\u0308henta\u0308minen riskien arvioinnissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Risk management and risk assessment can be viewed from several different angles and they have multiple guiding factors. The organization\u2019s strategy, culture and information security policy, as well as risk management models like PMBOK, ISO31000 and IRM can all be seen as guiding factors. In addition to these, there are multiple toolboxes designed to make it easier to implement these models in everyday actions. Tools like these include ISO27001, VAHTI and Katakri. The models of risk management include risk assessment, but they handle it very superficially. Basing risk assessment on the intuition of the assessor can be seen as a problem. The study was conducted as an assignment and the aim of the study was to provide support for developing the risk assessment process inside the principal organization. The study sought to pinpoint the problems of the risk assessment process in the organization and to build a model that can be generalized outside the organization as well. The results of the study show that it is possible to build a model to support the estimation of the risk probabilities. In time, by using the model the organization is able to build a strong database considering its risks and to use the database as a justification for assigned probabilities. The study was conducted as a qualitative case study and the main data collection method was a qualitative semi-structured interview. The model for risk assessment formed to be an iterative model that bases itself on the existing model. The aim of the model was to provide a better foundation for the risk management professionals to do their work and estimate the risks\u2019 probabilities. Through this foundation it is possible to weaken the effect of intuition in the process or at least provide a good justification for the level of probability of the risks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-06-14T07:55:10Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-14T07:55:10Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "83", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906143207", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskinarviointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskianalyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_64621
language fin
last_indexed 2025-02-18T10:54:47Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/b0f44ff4-508a-4b94-ad12-7641c3484492\/download","text":"URN:NBN:fi:jyu-201906143207.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Takala, Niko Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa Tietojärjestelmätiede Information Systems Science 601 riskienhallinta riskit kyberturvallisuus riskinarviointi riskianalyysi tietoturvapolitiikka tietoturva
title Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
title_full Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
title_fullStr Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
title_full_unstemmed Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
title_short Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
title_sort ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
title_txtP Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
topic Tietojärjestelmätiede Information Systems Science 601 riskienhallinta riskit kyberturvallisuus riskinarviointi riskianalyysi tietoturvapolitiikka tietoturva
topic_facet 601 Information Systems Science Tietojärjestelmätiede kyberturvallisuus riskianalyysi riskienhallinta riskinarviointi riskit tietoturva tietoturvapolitiikka
url https://jyx.jyu.fi/handle/123456789/64621 http://www.urn.fi/URN:NBN:fi:jyu-201906143207
work_keys_str_mv AT takalaniko ulkoistenkyberturvallisuudenriskienarviointifinanssialanorganisaatiossa