IoT-verkon tietoturvauhat ja niiden estäminen

Tässä tutkielmassa tutustutaan IoT-verkkoon kohdistuviin hyökkäyksiin, sekä tapoihin joilla suojautua niiltä. Tutkielman tavoitteena on kartoittaa tapoja joilla IoT-verkko voidaan toteuttaa turvallisesti tietoturvan ja yksityisyyden suojan kannalta. Aihetta tarkastellaan IoT:n kerrosarkkitehtuurin n...

Full description

Bibliographic Details
Main Author: Hämäläinen, Toni
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/68918
_version_ 1826225806354939904
author Hämäläinen, Toni
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Hämäläinen, Toni Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Hämäläinen, Toni Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Hämäläinen, Toni
datasource_str_mv jyx
description Tässä tutkielmassa tutustutaan IoT-verkkoon kohdistuviin hyökkäyksiin, sekä tapoihin joilla suojautua niiltä. Tutkielman tavoitteena on kartoittaa tapoja joilla IoT-verkko voidaan toteuttaa turvallisesti tietoturvan ja yksityisyyden suojan kannalta. Aihetta tarkastellaan IoT:n kerrosarkkitehtuurin näkökulmasta. Tutkielmassa kerrotaan tiettyihin kerrosarkkitehtuurin kerroksiin kohdistuvista hyökkäyksista ja suojastavoista. Tämän lisäksi tutkielmassa pohditaan, kuinka IoT-verkko voidaan toteuttaa mahdollisimman turvalliseksi tietoturvan kannalta. Tämä vaatii toimia niin laitevalmistajalta, kuin asiakkaalta. Näitä toimia ovat esimerkiksi ohjelmistopäivistysten ajankohtainen asentaminen, sekä erillisten turvallisuusmoduulien käyttäminen verkossa. This thesis focuses on researching different kind of security threats on internet of things. The goal of this research is to find ways to prevent these threats in order to create a safe IoT-network from the perspective of security and privacy of the user. The subject is viewed from the perspective of layered architecture of IoT. This thesis brings out the specific attacks and defense methods that target these specific layers in layered architecture of IoT. Besides this, the thesis discusses how IoT-network can be implemented safely from the perspective of security. This requires actions from the product manufacturer and from the client. These actions are quickly installing software updates and using separate safetymodule in the IoT-network.
first_indexed 2020-05-11T20:00:39Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "H\u00e4m\u00e4l\u00e4inen, Toni", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-11T06:38:44Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-11T06:38:44Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/68918", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tutustutaan IoT-verkkoon kohdistuviin hy\u00f6kk\u00e4yksiin, sek\u00e4 tapoihin joilla suojautua niilt\u00e4. Tutkielman tavoitteena on kartoittaa tapoja joilla IoT-verkko voidaan toteuttaa turvallisesti tietoturvan ja yksityisyyden suojan kannalta. Aihetta tarkastellaan IoT:n kerrosarkkitehtuurin n\u00e4k\u00f6kulmasta. Tutkielmassa kerrotaan tiettyihin kerrosarkkitehtuurin kerroksiin kohdistuvista hy\u00f6kk\u00e4yksista ja suojastavoista. T\u00e4m\u00e4n lis\u00e4ksi tutkielmassa pohditaan, kuinka IoT-verkko voidaan toteuttaa mahdollisimman turvalliseksi tietoturvan kannalta. T\u00e4m\u00e4 vaatii toimia niin laitevalmistajalta, kuin asiakkaalta. N\u00e4it\u00e4 toimia ovat esimerkiksi ohjelmistop\u00e4ivistysten ajankohtainen asentaminen, sek\u00e4 erillisten turvallisuusmoduulien k\u00e4ytt\u00e4minen verkossa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis focuses on researching different kind of security threats on internet of things. The goal of this research is to find ways to prevent these threats in order to create a safe IoT-network from the perspective of security and privacy of the user. The subject is viewed from the perspective of layered architecture of IoT. This thesis brings out the specific attacks and defense methods that target these specific layers in layered architecture of IoT. Besides this, the thesis discusses how IoT-network can be implemented safely from the perspective of security. This requires actions from the product manufacturer and from the client. These actions are quickly installing software updates and using separate safetymodule in the IoT-network.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-11T06:38:44Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-11T06:38:44Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kerrosarkkitehtuuri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT-elementit", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT-hy\u00f6kk\u00e4ykset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "esineiden internetin suojaaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "IoT-verkon tietoturvauhat ja niiden est\u00e4minen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005113124", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksil\u00f6nsuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoliikenne", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "suojaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_68918
language fin
last_indexed 2025-02-18T10:56:01Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/9530397a-ae28-4178-a614-5f5b6d2830d8\/download","text":"URN:NBN:fi:jyu-202005113124.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Hämäläinen, Toni IoT-verkon tietoturvauhat ja niiden estäminen kerrosarkkitehtuuri IoT-elementit IoT-hyökkäykset esineiden internetin suojaaminen Tietotekniikka Mathematical Information Technology 602 yksilönsuoja tietoturva esineiden internet tietosuoja Internet salaus haittaohjelmat tietotekniikka tietoliikenne hakkerointi suojaus
title IoT-verkon tietoturvauhat ja niiden estäminen
title_full IoT-verkon tietoturvauhat ja niiden estäminen
title_fullStr IoT-verkon tietoturvauhat ja niiden estäminen IoT-verkon tietoturvauhat ja niiden estäminen
title_full_unstemmed IoT-verkon tietoturvauhat ja niiden estäminen IoT-verkon tietoturvauhat ja niiden estäminen
title_short IoT-verkon tietoturvauhat ja niiden estäminen
title_sort iot verkon tietoturvauhat ja niiden estäminen
title_txtP IoT-verkon tietoturvauhat ja niiden estäminen
topic kerrosarkkitehtuuri IoT-elementit IoT-hyökkäykset esineiden internetin suojaaminen Tietotekniikka Mathematical Information Technology 602 yksilönsuoja tietoturva esineiden internet tietosuoja Internet salaus haittaohjelmat tietotekniikka tietoliikenne hakkerointi suojaus
topic_facet 602 Internet IoT-elementit IoT-hyökkäykset Mathematical Information Technology Tietotekniikka esineiden internet esineiden internetin suojaaminen haittaohjelmat hakkerointi kerrosarkkitehtuuri salaus suojaus tietoliikenne tietosuoja tietotekniikka tietoturva yksilönsuoja
url https://jyx.jyu.fi/handle/123456789/68918 http://www.urn.fi/URN:NBN:fi:jyu-202005113124
work_keys_str_mv AT hämäläinentoni iotverkontietoturvauhatjaniidenestäminen