fullrecord |
[{"key": "dc.contributor.advisor", "value": "Palonen, Teija", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Taipale, Juho", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-07-02T07:48:25Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-07-02T07:48:25Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64952", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kandidaatin tutkielmassa tarkasteltiin erilaisia tunnistautumismenetelmi\u00e4 tietoj\u00e4rjestelmiss\u00e4. Tavoitteena oli selvitt\u00e4\u00e4, mink\u00e4laisia erilaisia tunnistautumismenetelmi\u00e4 on olemassa ja mitk\u00e4 tekij\u00e4t vaikuttavat niiden valintaan. Tutkielmassa saatiin selville, ett\u00e4 tunnistautumismenetelm\u00e4t voidaan jakaa ominaispiirteidens\u00e4 perusteella tietoon, hallussapitoon ja erityiseen ominaisuuteen perustuviin menetelmiin. Menetelm\u00e4st\u00e4 riippumatta tietoturva ja k\u00e4ytett\u00e4vyys joutuvat usein vastakkainasettelun kohteiksi, ja siksi onkin t\u00e4rke\u00e4\u00e4, ett\u00e4 tietoj\u00e4rjestelm\u00e4\u00e4 suunniteltaessa ja sen tunnistautumismenetelm\u00e4\u00e4 valittaessa kiinnitet\u00e4\u00e4n huomiota sek\u00e4 tietoturvaan ett\u00e4 k\u00e4ytett\u00e4vyyteen, mutta my\u00f6s valitusta menetelm\u00e4st\u00e4 aiheutuviin kustannuksiin kohdej\u00e4rjestelm\u00e4n erityispiirteet huomioon ottaen. Voimakkaasti digitalisoituva toimintaymp\u00e4rist\u00f6 avaa hy\u00f6kk\u00e4\u00e4jille jatkuvasti uusia portteja erilaisiin tietoj\u00e4rjestelmiin, jotka t\u00e4n\u00e4 p\u00e4iv\u00e4n\u00e4 vaikuttavat yh\u00e4 enemm\u00e4n my\u00f6s yhteiskunnan toimintoihin. Tunnistautuminen on yksi tietoturvallisen tietoj\u00e4rjestelm\u00e4n p\u00e4\u00e4komponenteista, joka oikein toteutettuna vahvistaa j\u00e4rjestelm\u00e4n tietoturvaa. Viimeaikaisten laajojen tietovuotojen juurisyyt ovat liittyneet sek\u00e4 j\u00e4rjestelmien teknisiin puutteisiin ett\u00e4 yksitt\u00e4isten k\u00e4ytt\u00e4jien huolimattomuuteen. T\u00e4m\u00e4 kandidaatin tutkielma on toteutettu aikaisempaan tutkimukseen perustuvana kirjallisuuskatsauksena ja tunnistautumisen osalta aihe on rajattu k\u00e4sittelem\u00e4\u00e4n ihmist\u00e4 tunnistautuvana tietoj\u00e4rjestelm\u00e4n faktorina.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis examined different authentication methods in information systems. The aim was to find out what kind of different authentication methods exist and what factors influence their selection. The thesis discovered that authentication methods can be divided into methods based on knowledge, possession, or special characteristics. Regardless of the method, security and usability are often subject to confrontation. Therefore, it is important that attention is paid to both security and usability when designing the information system and selecting its authentication method. In addition, the costs of the selected authentication method and the specificities of the target system need to be taken into account. The heavily digitized operating environment constantly opens new gateways to attackers for various information systems, which today are increasingly affecting the activities on a societal level. Authentication is one of the key components of a secure information system that, when properly implemented, strengthens system security. The root causes of recent large-scale information leaks have been related to both the technical failures of the systems as well as the negligence by individual users. This bachelor\u2019s thesis has been carried out as a literature review based on previous research, and in terms of authentication, the topic is limited to dealing with a person as an authenticable information system factor.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-07-02T07:48:25Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-07-02T07:48:25Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "37", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tunnistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tunnistautumismenetelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tunnistautumismenetelm\u00e4t tietoj\u00e4rjestelmiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201907023538", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sormenj\u00e4ljet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|