Tietoturvapolitiikan luomisen taksonomia

Tämä pro gradu -tutkimus käsittelee tietoturvapolitiikan luomista ja tarkastelee sitä systemaattisen kirjallisuuskatsauksen keinoin. Tutkimusaineisto on kasattu keväällä 2016 ja se käsittää vuosien 1999 – 2016 välillä julkaistut tieteelliset artikkelit. Tutkimuksessa kuvataan niitä metodeja, joilla...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Turunen, Samu
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:fin
Julkaistu: 2019
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/65379
_version_ 1828193084341485568
author Turunen, Samu
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Turunen, Samu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Turunen, Samu Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Turunen, Samu
datasource_str_mv jyx
description Tämä pro gradu -tutkimus käsittelee tietoturvapolitiikan luomista ja tarkastelee sitä systemaattisen kirjallisuuskatsauksen keinoin. Tutkimusaineisto on kasattu keväällä 2016 ja se käsittää vuosien 1999 – 2016 välillä julkaistut tieteelliset artikkelit. Tutkimuksessa kuvataan niitä metodeja, joilla tietoturvapolitiikka voidaan luoda organisaatioon joko tyhjästä tai vanhan tietoturvapolitiikan päälle. Tietoturvapolitiikan katsotaan tässä tutkimuksessa olevan ylätason dokumentti, joka ohjaa organisaation toimintaa tietoturvallisuuteen liittyvissä kysymyksissä ja askareissa. Tietoturvapolitiikan luomisen keinoja havaittiin teemoitetusti olevan kolme: Riskien tunnistaminen ja hallinta, yleiset analyysityökalut ja organisaation tehtävät ja arvot. Aineiston perusteella yleisin tapa tietoturvapolitiikan luomiseen tieteellisessä kirjallisuudessa on organisaation keskeisten tehtävien ja tapojen havainnoinnin ja kartoituksen pohjalta tehtävä selvitys. This master’s thesis describes the creation of information security policies by using methodology of systematic literature review. The data is gathered during Spring 2016 and it includes scientific articles from 1999 to year 2016. This re-search describes methods of creating an information security policy from start or after old information security policy is at end of life. In this research infor-mation security policy is described as high-level policy, which steers organisa-tion’s security and normal activity. Three methods to create an information se-curity policy were found: Risk observation and management, general analysis tools, and organisation’s key processes and core values. According to the ana-lyzed data the most common methodology to create an information security policy is to base the creation on observation and analyzation of organisation’s key processes and core values.
first_indexed 2019-09-02T20:38:38Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Turunen, Samu", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-09-02T04:57:41Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-09-02T04:57:41Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/65379", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 pro gradu -tutkimus k\u00e4sittelee tietoturvapolitiikan luomista ja tarkastelee sit\u00e4 systemaattisen kirjallisuuskatsauksen keinoin. Tutkimusaineisto on kasattu kev\u00e4\u00e4ll\u00e4 2016 ja se k\u00e4sitt\u00e4\u00e4 vuosien 1999 \u2013 2016 v\u00e4lill\u00e4 julkaistut tieteelliset artikkelit. Tutkimuksessa kuvataan niit\u00e4 metodeja, joilla tietoturvapolitiikka voidaan luoda organisaatioon joko tyhj\u00e4st\u00e4 tai vanhan tietoturvapolitiikan p\u00e4\u00e4lle. Tietoturvapolitiikan katsotaan t\u00e4ss\u00e4 tutkimuksessa olevan yl\u00e4tason dokumentti, joka ohjaa organisaation toimintaa tietoturvallisuuteen liittyviss\u00e4 kysymyksiss\u00e4 ja askareissa. Tietoturvapolitiikan luomisen keinoja havaittiin teemoitetusti olevan kolme: Riskien tunnistaminen ja hallinta, yleiset analyysity\u00f6kalut ja organisaation teht\u00e4v\u00e4t ja arvot. Aineiston perusteella yleisin tapa tietoturvapolitiikan luomiseen tieteellisess\u00e4 kirjallisuudessa on organisaation keskeisten teht\u00e4vien ja tapojen havainnoinnin ja kartoituksen pohjalta teht\u00e4v\u00e4 selvitys.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master\u2019s thesis describes the creation of information security policies by using methodology of systematic literature review. The data is gathered during Spring 2016 and it includes scientific articles from 1999 to year 2016. This re-search describes methods of creating an information security policy from start or after old information security policy is at end of life. In this research infor-mation security policy is described as high-level policy, which steers organisa-tion\u2019s security and normal activity. Three methods to create an information se-curity policy were found: Risk observation and management, general analysis tools, and organisation\u2019s key processes and core values. According to the ana-lyzed data the most common methodology to create an information security policy is to base the creation on observation and analyzation of organisation\u2019s key processes and core values.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-09-02T04:57:40Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-09-02T04:57:41Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "45", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvapolitiikan luomisen taksonomia", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201909023984", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_65379
language fin
last_indexed 2025-03-31T20:02:18Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/174a0146-d3c8-4dbe-a9a1-8ecd9b3adcee\/download","text":"URN:NBN:fi:jyu-201909023984.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Turunen, Samu Tietoturvapolitiikan luomisen taksonomia Tietojärjestelmätiede Information Systems Science 601 kyberturvallisuus tietoturva tietoturvapolitiikka
title Tietoturvapolitiikan luomisen taksonomia
title_full Tietoturvapolitiikan luomisen taksonomia
title_fullStr Tietoturvapolitiikan luomisen taksonomia Tietoturvapolitiikan luomisen taksonomia
title_full_unstemmed Tietoturvapolitiikan luomisen taksonomia Tietoturvapolitiikan luomisen taksonomia
title_short Tietoturvapolitiikan luomisen taksonomia
title_sort tietoturvapolitiikan luomisen taksonomia
title_txtP Tietoturvapolitiikan luomisen taksonomia
topic Tietojärjestelmätiede Information Systems Science 601 kyberturvallisuus tietoturva tietoturvapolitiikka
topic_facet 601 Information Systems Science Tietojärjestelmätiede kyberturvallisuus tietoturva tietoturvapolitiikka
url https://jyx.jyu.fi/handle/123456789/65379 http://www.urn.fi/URN:NBN:fi:jyu-201909023984
work_keys_str_mv AT turunensamu tietoturvapolitiikanluomisentaksonomia