fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kollanus, Sami", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Virtanen, Alex", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-25T10:28:27Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-25T10:28:27Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64842", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkielma k\u00e4sittelee kriittisen infrastruktuurin tuotanto- ja jakeluprosessien SCADA-j\u00e4rjestelmien toimintavarmuutta sek\u00e4 resilienssi\u00e4 kyberturvallisuuden n\u00e4k\u00f6kulmasta. Tutkielman tarkoituksena on selvitt\u00e4\u00e4, kuinka erilaiset parhaat k\u00e4yt\u00e4nteet ja viitekehykset neuvovat kriittisen infrastruktuurin organisaatioita vahvistamaan omaa toimintavarmuuttaan jatkuvasti muuttuvan kyberulottuvuuden toimintah\u00e4iri\u00f6iden varalta. Tutkielma pyrkii etsim\u00e4\u00e4n n\u00e4ist\u00e4 viitekehyksist\u00e4 yhtenev\u00e4isyyksi\u00e4 sek\u00e4 eroavaisuuksia ja vertailemaan n\u00e4it\u00e4 luvussa nelj\u00e4 esitellyn toimintavarmuustaulukon avulla. Tutkimus toteutettiin kirjallisuuskatsauksena, jossa hy\u00f6dynnettiin aikaisempia vertaisarvioituja tieteellisi\u00e4 julkaisuja, artikkeleita, kirjallisuutta ja viitekehyksi\u00e4. Tutkimuksen tuloksia tarkastellessa huomattiin, ett\u00e4 oikeanlainen suunnittelu ja sen suunnitelman toteutus toimintah\u00e4iri\u00f6n varalle ovat avaintekij\u00f6it\u00e4 organisaation toimintavarmuuden palauttamiseen ja resilienssin vahvistamiseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This Bachelor\u2019s Thesis addresses the reliability of critical infrastructure\u2019s SCADA systems from a resilience and cyber security perspective. This thesis is meant to define how different best practices and frameworks advise critical infrastructure organizations to strengthen their own operational reliability in the event of ever-changing cyber-disruptions. The thesis aims to find similarities and differences between these frameworks and compare them with the operational reliability table presented in Chapter 4. The research was done by using systematic literature review methods where data that was used were from peerreviewed academic papers, articles, literature, and frameworks. The study found that proper planning and implementation for possible operational cybermalfunctions are key factors in restoring the operational reliability of the organization and strengthening resilience.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-06-25T10:28:27Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-25T10:28:27Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "33", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kriittinen infrastruktuuri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SCADA", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kriittisen infrastruktuurin ohjausj\u00e4rjestelmien kyberturvallisuus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906253428", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "resilienssi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjausj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00f6varmuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|