Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen

Kyberturvallisuus on noussut jatkuvasti tärkeämmäksi osa-alueeksi nykypäiväisessä yhteiskunnassa. Jatkuva kehitys tuo mukanaan uusia haavoittuvuuksia, joiden avulla voidaan toteuttaa kyberuhkia. Toisaalta myös kyberturvallisuuden opiskelu ja yleinen kiinnostus kyberturvallisuutta kohtaan on ollut no...

Full description

Bibliographic Details
Main Author: Tarakkamäki, Aleksi
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/68964
_version_ 1826225794491351040
author Tarakkamäki, Aleksi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Tarakkamäki, Aleksi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tarakkamäki, Aleksi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Tarakkamäki, Aleksi
datasource_str_mv jyx
description Kyberturvallisuus on noussut jatkuvasti tärkeämmäksi osa-alueeksi nykypäiväisessä yhteiskunnassa. Jatkuva kehitys tuo mukanaan uusia haavoittuvuuksia, joiden avulla voidaan toteuttaa kyberuhkia. Toisaalta myös kyberturvallisuuden opiskelu ja yleinen kiinnostus kyberturvallisuutta kohtaan on ollut nousussa. Esimerkiksi Capture The Flag -haasteet ovat saaneet viime vuosina laajemmin huomiota. Tässä tutkielmassa tarkastellaan CTF - haasteita, sekä niiden soveltamista kyberturvallisuuden opettamiseen.
first_indexed 2020-05-13T20:02:20Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Juutinen, Sanna", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tarakkam\u00e4ki, Aleksi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-13T11:26:21Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-13T11:26:21Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/68964", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberturvallisuus on noussut jatkuvasti t\u00e4rke\u00e4mm\u00e4ksi osa-alueeksi nykyp\u00e4iv\u00e4isess\u00e4 yhteiskunnassa. Jatkuva kehitys tuo mukanaan uusia haavoittuvuuksia, joiden avulla voidaan toteuttaa kyberuhkia. Toisaalta my\u00f6s kyberturvallisuuden opiskelu ja yleinen kiinnostus kyberturvallisuutta kohtaan on ollut nousussa. Esimerkiksi Capture The Flag -haasteet\novat saaneet viime vuosina laajemmin huomiota. T\u00e4ss\u00e4 tutkielmassa tarkastellaan CTF -\nhaasteita, sek\u00e4 niiden soveltamista kyberturvallisuuden opettamiseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-13T11:26:21Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-13T11:26:21Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "CTF", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Capture the flag", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005133171", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "oppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "opetus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_68964
language fin
last_indexed 2025-02-18T10:54:16Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/b769dcbe-7120-4c22-badc-1cdf40fb0298\/download","text":"URN:NBN:fi:jyu-202005133171.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Tarakkamäki, Aleksi Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen CTF Capture the flag Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus tietoturva Internet tietotekniikka tietoverkot turvallisuus esineiden internet oppiminen opetus
title Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen
title_full Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen
title_fullStr Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen
title_full_unstemmed Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen
title_short Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen
title_sort capture the flag mallin soveltuminen kyberturvallisuuden opetukseen
title_txtP Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen
topic CTF Capture the flag Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus tietoturva Internet tietotekniikka tietoverkot turvallisuus esineiden internet oppiminen opetus
topic_facet 602 CTF Capture the flag Internet Mathematical Information Technology Tietotekniikka esineiden internet kyberturvallisuus opetus oppiminen tietotekniikka tietoturva tietoverkot turvallisuus
url https://jyx.jyu.fi/handle/123456789/68964 http://www.urn.fi/URN:NBN:fi:jyu-202005133171
work_keys_str_mv AT tarakkamäkialeksi capturetheflagmallinsoveltuminenkyberturvallisuudenopetukseen