fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kollanus, Sami", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kataja, Mette", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-11-29T06:59:50Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-11-29T06:59:50Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/66566", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Maailman digitalisoitumisen seurauksena ker\u00e4tyn datan m\u00e4\u00e4r\u00e4 on kasvanut eksponentiaalisesti, tietoj\u00e4rjestelm\u00e4t ovat monimutkaistuneet ja kyberhy\u00f6kk\u00e4ykset kehittyneet teknologian kehityksen mukana, jonka vuoksi perinteiset kyberhy\u00f6kk\u00e4yksen torjuntamenetelm\u00e4t eiv\u00e4t en\u00e4\u00e4 yksin\u00e4\u00e4n riit\u00e4 suojaamaan organisaatioita.\nTutkielmassa tarkastellaan miten Cyber Threat Intelligence edesauttaa organisaatioiden tietoturvaa ja mit\u00e4 haasteita se tuo. Tutkielma on toteutettu kirjallisuuskatsauksena ja se pyrkii vastaamaan tutkimuskysymykseen: \u201dMit\u00e4 on Cyber Threat Intelligence, miten se vaikuttaa ja mit\u00e4 haasteita se tuo?\u201d.\nKehittyneiden kyberhy\u00f6kk\u00e4yksien takia yleist\u00e4 toimintatapaa t\u00e4ytyisi siirt\u00e4\u00e4 hy\u00f6kk\u00e4yksist\u00e4 aiheutuneiden vahinkojen j\u00e4lkik\u00e4teen korjaamisesta hy\u00f6kk\u00e4yksien ennakoimiseen. Hy\u00f6kk\u00e4yksien ennakoimiseen yksi tapa on hy\u00f6dynt\u00e4\u00e4 Big Dataa, sill\u00e4 ker\u00e4tyn datan seasta l\u00f6ytyy vastauksia useampiinkin ongelmiin, mutta datan valtavan m\u00e4\u00e4r\u00e4n ja monimutkaisuuden vuoksi, sit\u00e4 on hidasta ker\u00e4t\u00e4 ja prosessoida sek\u00e4 vaikea hallita.\nUusi nouseva trendi on Cyber Threat Intelligence, jonka tarkoituksena on hy\u00f6dynt\u00e4\u00e4 erilaisista l\u00e4hteist\u00e4 saatua analysoitua informaatiota kyberuhista ja sen perusteella tehd\u00e4 p\u00e4\u00e4t\u00f6ksi\u00e4 tietoturvan parantamiseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-11-29T06:59:50Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-11-29T06:59:50Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Cyber Threat Intelligence", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Threat Intelligence", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Cyber Threat Intelligence", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201911295052", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "big data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|