fullrecord |
[{"key": "dc.contributor.author", "value": "Immonen, Riku", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-11-11T07:59:41Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-11-11T07:59:41Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/66295", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 teollisuusautomaatioj\u00e4rjestelmien ja teollisen internetin kyberturvallisuutta k\u00e4sittelev\u00e4 tutkielma kartoittaa teollisuusyrityksiin kohdistuvia kyberuhkia sek\u00e4 toimintatapoja ja menetelmi\u00e4, joilla n\u00e4ist\u00e4 uhkista voidaan selvit\u00e4 ilman suurempia menetyksi\u00e4. Tutkielman yhten\u00e4 tavoitteena oli suunnnitella ja toteuttaa tilaajayritykselle kyberturvallinen IIoT-arkkitehtuuriratkaisu, jolla teollisuuslaitoksista pystytt\u00e4isiin siirt\u00e4m\u00e4\u00e4n dataa pilveen turvallisesti, tehokkaasti ja luotettavasti. Sama IIoT-arkkitehtuuriratkaisu olisi lis\u00e4ksi kyett\u00e4v\u00e4 implementoimaan\r\nkaikkiin yrityksen teollisuuslaitoksiin, jotta erilaisten IIoT-ratkaisujen m\u00e4\u00e4r\u00e4, mutta\r\nsamalla my\u00f6s kyberuhkat, pystytt\u00e4isiin minimoimaan ja pit\u00e4m\u00e4\u00e4n hallinnassa.\r\nTutkielmassa kartoitettiin aluksi kirjallisuuskatsauksen menetelmin teollisuusautomaatioj\u00e4rjestelmien kyberturvallisuuden erityispiirteit\u00e4, haavoittuvuuksia ja kyberturvallisuusratkaisuja. T\u00e4m\u00e4n j\u00e4lkeen suunniteltiin optimaalinen konstruktio eli\r\nIIoT-arkkitehtuuriratkaisu, joka pit\u00e4\u00e4 sis\u00e4ll\u00e4\u00e4n IIoT-sovellukset, -tiedonsiirtoverkot,\r\ntiedonsiirtoprotokollat ja tietoturvan, joilla pystyt\u00e4\u00e4n siirt\u00e4m\u00e4\u00e4n dataa tehokkaasti,\r\nmutta my\u00f6s torjumaan kirjallisuuskatsauksessa selvitetyt kyberuhkat. Lopuksi IIoT-\r\narkkitehtuuriratkaisu implementoitiin teollisuuslaitokselle ja pilveen, ja sen toimivuus testattiin k\u00e4yt\u00e4nn\u00f6ss\u00e4.\r\nTutkielman yhteenvetona voidaan todeta, ett\u00e4 ratkaisu toimi tehdasymp\u00e4rist\u00f6ss\u00e4 hyvin ja pienet datam\u00e4\u00e4r\u00e4t saatiin siirretty\u00e4 automaatioj\u00e4rjestelm\u00e4st\u00e4 ja sensorinoodeista luotettavasti pilveen. Tulevaisuudessa on kuitenkin pystytt\u00e4v\u00e4 siirt\u00e4m\u00e4\u00e4n ja k\u00e4sittelem\u00e4\u00e4n dataa viel\u00e4kin enemm\u00e4n, koska teko\u00e4lysovellukset vaativat\r\nkoko ajan suurempia datam\u00e4\u00e4ri\u00e4. Kasvavat datam\u00e4\u00e4r\u00e4t voivatkin tulevaisuudessa\r\ntehd\u00e4 IIoT-j\u00e4rjestelm\u00e4n rajapinnoista pullonkauloja. IIoT-rajapintojen kuormitustestaus onkin tutkielmalle luonnollinen jatkotutkimusaihe.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master\u2019s thesis on cyber security for the industrial control systems\r\n(ICS) and the industrial internet of things (IIoT) explores cyber threats against industrial companies, and practices and methods to overcome these cyber threats without major losses. One of the aims of the study was to design and implement a cybersecure IIoT architecture for the subscriber company that can be used to transfer\r\ndata from ICS to the cloud safely and reliably. In addition, the same IIoT architecture\r\nshould be able to be implemented in all industrial plants in order to minimize and\r\nmanage the number of different IIoT solutions, but also threatening cyber threats.\r\nThe thesis \ufb01rst explored the special features of cyber security in automation systems, such as vulnerabilities and cyber security methods. This was followed by an\r\noptimal construction, the IIoT architecture, which includes IIoT applications, data\r\ntransmission networks, data transfer protocols and data security to transfer data ef\ufb01ciently, but also to eliminate cyber threats identi\ufb01ed in the literature review. Finally, the IIoT architecture was practically implemented at an industrial plant and the\r\ncloud where its functionality was tested.\r\nIn conclusion, the architecture worked well in the factory environment and with\r\nsmall data volumes. Data packets were reliably transferred from the automation\r\nsystem and sensor nodes to the cloud. However, in the future, it will be necessary to be able to transfer and process data even more, because arti\ufb01cial intelligence\r\napplications require continuous higher data volumes. In the future, IIoT interfaces\r\ncan become bottlenecks in the system. Therefore, the load testing of the IIoT interfaces is a natural subject for further research.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-11-11T07:59:41Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-11-11T07:59:41Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "84", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "teollisuusautomaatioj\u00e4rjestelm\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "teollinen internet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teollisuusautomaatioj\u00e4rjestelmien ja teollisen internetin kyberturvallisuus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201911114809", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teollisuusautomaatio", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "automaatioj\u00e4rjestelm\u00e4t", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|