_version_ |
1809901471198609408
|
annif_keywords_txtF_mv |
processes
planning and design
enterprises
leadership (activity)
militarism
|
annif_uris_txtF_mv |
http://www.yso.fi/onto/yso/p2111
http://www.yso.fi/onto/yso/p1377
http://www.yso.fi/onto/yso/p3128
http://www.yso.fi/onto/yso/p554
http://www.yso.fi/onto/yso/p17142
|
author |
Tuovinen, Jussi
Frilander, Kimmo
|
author2 |
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Tietojenkäsittelytiede
Computer Science
601
|
author_facet |
Tuovinen, Jussi
Frilander, Kimmo
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Tietojenkäsittelytiede
Computer Science
601
Tuovinen, Jussi
Frilander, Kimmo
|
author_sort |
Tuovinen, Jussi
|
building |
Jyväskylän yliopisto
JYX-julkaisuarkisto
|
datasource_str_mv |
jyx
|
department_txtF |
Informaatioteknologia
|
faculty_txtF |
Informaatioteknologian tiedekunta
|
first_indexed |
2019-08-14T20:02:17Z
|
format |
Pro gradu
|
format_ext_str_mv |
Opinnäyte
Pro gradu
|
free_online_boolean |
1
|
fullrecord |
<?xml version="1.0"?>
<qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework</title><creator>Tuovinen, Jussi</creator><creator>Frilander, Kimmo</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyväskylän yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyväskylä</contributor><contributor type="oppiaine" lang="fi">Tietojenkäsittelytiede</contributor><contributor type="oppiaine" lang="en">Computer Science</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">Red teaming</subject><subject type="other">cyber security</subject><subject type="other">information security</subject><subject type="other">risk management</subject><subject type="other">penetration testing</subject><subject type="other">intelligence</subject><subject type="other">targeting</subject><subject type="other">military decision making</subject><subject type="other">mission command</subject><subject type="other">agile</subject><subject type="other">informaatioturvallisuus</subject><subject type="other">penetraatiotestaus</subject><subject type="other">tiedustelu</subject><subject type="other">suunnitteluprosessi</subject><subject type="other">tilannejohtaminen</subject><subject type="other">ketteryys</subject><subject type="yso">ketterät menetelmät</subject><subject type="yso">tiedustelu</subject><subject type="yso">riskienhallinta</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">agile methods</subject><subject type="yso">intelligence and reconnaissance</subject><subject type="yso">risk management</subject><subject type="yso">cyber security</subject><available>2019-08-14T06:28:54Z</available><issued>2019</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master’s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/65230</identifier><identifier type="urn">URN:NBN:fi:jyu-201908143830</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201908143830</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/65230/1/URN%3aNBN%3afi%3ajyu-201908143830.pdf" name="URN:NBN:fi:jyu-201908143830.pdf" type="application/pdf" length="6324743" sequence="1"/><recordID>123456789_65230</recordID></qualifieddc>
|
id |
jyx.123456789_65230
|
language |
eng
|
last_indexed |
2024-09-03T10:51:55Z
|
main_date |
2019-01-01T00:00:00Z
|
main_date_str |
2019
|
online_boolean |
1
|
online_urls_str_mv |
{"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/65230\/1\/URN%3aNBN%3afi%3ajyu-201908143830.pdf","text":"URN:NBN:fi:jyu-201908143830.pdf","source":"jyx","mediaType":"application\/pdf"}
|
oppiainekoodi_txtF |
601
|
publication_first_indexed |
2019-08-14T20:02:17Z
|
publishDate |
2019
|
record_format |
qdc
|
source_str_mv |
jyx
|
spellingShingle |
Tuovinen, Jussi
Frilander, Kimmo
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
Red teaming
cyber security
information security
risk management
penetration testing
intelligence
targeting
military decision making
mission command
agile
informaatioturvallisuus
penetraatiotestaus
tiedustelu
suunnitteluprosessi
tilannejohtaminen
ketteryys
ketterät menetelmät
riskienhallinta
kyberturvallisuus
agile methods
intelligence and reconnaissance
|
subject_txtF |
Kognitiotiede
|
thumbnail |
https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_65230&index=0&size=large
|
title |
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
title_full |
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
title_fullStr |
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
title_full_unstemmed |
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
title_short |
Militarizing red teaming
|
title_sort |
militarizing red teaming agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
title_sub |
agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
title_txtP |
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
|
topic |
Red teaming
cyber security
information security
risk management
penetration testing
intelligence
targeting
military decision making
mission command
agile
informaatioturvallisuus
penetraatiotestaus
tiedustelu
suunnitteluprosessi
tilannejohtaminen
ketteryys
ketterät menetelmät
riskienhallinta
kyberturvallisuus
agile methods
intelligence and reconnaissance
|
topic_facet |
Red teaming
agile
agile methods
cyber security
informaatioturvallisuus
information security
intelligence
intelligence and reconnaissance
ketteryys
ketterät menetelmät
kyberturvallisuus
military decision making
mission command
penetraatiotestaus
penetration testing
risk management
riskienhallinta
suunnitteluprosessi
targeting
tiedustelu
tilannejohtaminen
|
url |
https://jyx.jyu.fi/handle/123456789/65230
http://www.urn.fi/URN:NBN:fi:jyu-201908143830
|
work_keys_str_mv |
AT tuovinenjussi militarizingredteamingagileandscalableprocessforcyberredteamingusingadaptiveplanni
|