fullrecord |
[{"key": "dc.contributor.author", "value": "Luukkonen, Joonas", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-12T12:17:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-12T12:17:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/68943", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Erilaisten laitteiden m\u00e4\u00e4r\u00e4 internetiss\u00e4 on jatkuvassa nousussa. N\u00e4ille laitteille on suurta kysynt\u00e4\u00e4, ja niiden hy\u00f6dyt ovat selkeit\u00e4 tietyille k\u00e4ytt\u00e4j\u00e4ryhmille. Osa n\u00e4ist\u00e4 laitteista on osana \u00e4lykotia, tehden asukkaiden arjesta helpompaa sek\u00e4 turvallisempaa. N\u00e4ihin laitteisiin liittyy kuitenkin erilaisia kyberturvauhkia, ja t\u00e4m\u00e4n tutkielman tarkoituksena on selvitt\u00e4\u00e4, mitk\u00e4 ovat merkitt\u00e4vimm\u00e4t uhkat \u00e4lykodin esineiden internetille, sek\u00e4 mahdolliset ratkaisut. Tutkielmassa haettiin vastausta kahteen tutkimuskysymyksiin, jotka ovat seuraavat: Mitk\u00e4 ovat suurimmat haasteet \u00e4lykodin kyberturvallisuudelle? Sek\u00e4 mill\u00e4 keinoin \u00e4lykodin kyberturvallisuutta voidaan parantaa? Tutkielma toteutettiin kirjallisuuskatsauksena ja l\u00e4htein\u00e4 on p\u00e4\u00e4s\u00e4\u00e4nt\u00f6isesti k\u00e4ytetty akateemisia julkaisuja. Tutkielman tuloksena voitiin tunnistaa t\u00e4rkeimm\u00e4t uhkat, sek\u00e4 esitt\u00e4\u00e4 niille mahdollisia ratkaisuja. Suurimmiksi uhkiksi nousi palvelunestohy\u00f6kk\u00e4ykset, heterogeenisyys sek\u00e4 datan hallinta. N\u00e4it\u00e4 haasteita voidaan parantaa erilaisilla suojausohjelmilla, laitteiden kehitt\u00e4misell\u00e4 sek\u00e4 tehokkaammalla datan suojauksella.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The device count in the internet of things is growing constantly. There is a great demand for different connected devices and there are visible benefits of using these devices for certain groups. Some of these devices are a part of a smart home, making living easier and safer. There is, however, some cyberthreats involved in using these. The goal of this thesis is to find the greatest threats to smart homes cybersecurity and find possible solutions for those. This is done by answering two research questions. First question is what are the greatest threats to smart home cybersecurity? And the second question is what can be done to improve the smart home cybersecurity? This thesis is made by literature review and references are mostly academic journals. As a result of this thesis, greatest threats could be identified, and simple solutions presented to solve those. Greatest threats are denial-of-service attack, heterogeneity and managing data. These threats could be solved with different security software\u2019s, improving devices and greater protection of data.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-12T12:17:55Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-12T12:17:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "\u00e4lykoti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "\u00c4lykodin IoT-laitteiden kyberturvallisuus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005123151", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lytalot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|