fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Siukonen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Vatanen, Ville", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-18T12:28:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-18T12:28:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/69032", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Vuonna 2007 Ven\u00e4j\u00e4 toteutti Viron valtiota vastaan useita viikkoja kest\u00e4neen kyberoperaation. T\u00e4m\u00e4 oli ensimm\u00e4inen kerta, kun valtio toteutti j\u00e4rjestelm\u00e4llisen, hy\u00f6kk\u00e4yksellisen operaation tietoverkkojen kautta toista valtiota vastaan. Vaikka vahingot j\u00e4iv\u00e4t lopulta v\u00e4h\u00e4isiksi, her\u00e4tti se huomiota erityisesti l\u00e4nsimaissa. Viron j\u00e4lkeen Ven\u00e4j\u00e4n kyberoperaatioiden kohteina ovat olleet erityisesti sen naapurimaat. N\u00e4m\u00e4 valtiot ovat tyypillisesti olleet vanhoja neuvostotasavaltoja, jotka ovat pyrkineet irtautumaan Ven\u00e4j\u00e4n valtapiirist\u00e4 ja l\u00e4hentym\u00e4\u00e4n l\u00e4nsimaiden kanssa tai asettuneet vastustamaan Ven\u00e4j\u00e4n geopoliittisia tavoitteita. T\u00e4m\u00e4 pro gradu -tutkielma tutki Ven\u00e4j\u00e4n l\u00e4hialueillaan toteuttamia kyberoperaatioita, jotka toteutettiin vuosien 2007 ja 2017 v\u00e4lisen\u00e4 aikana. Tutkimuksen tutkimusstrategiana k\u00e4ytettiin monitapaustutkimusta, joka soveltuu hyvin tutkimuksiin, joissa kiinnostuksen kohteena on useampi kuin yksi tapaus. Tutkimus on saanut vaikutteita postpositivistisen tieteenfilosofian suuntauksesta. Tutkimuksen kirjallisuuskatsauksessa m\u00e4\u00e4riteltiin attribuution ja kyberoperaation k\u00e4sitteet, selvitettiin, mit\u00e4 kyberoperaatioita Ven\u00e4j\u00e4 on toteuttanut l\u00e4hialueillaan sek\u00e4 millaisia kyberhy\u00f6kk\u00e4yksen mallintamisen menetelmi\u00e4 on kehitetty. Katsauksen perusteella tutkimukseen valikoitui yhteens\u00e4 kuusi operaatiota, jotka on toteutettu Viroa, Liettuaa, Georgiaa ja Ukrainaa vastaan. Ukrainaa kohtaan toteutettiin kolme erillist\u00e4 kyberoperaatiota. Lis\u00e4ksi operaatioiden analysointiin valittiin sovellettu yhdistetty tappoketju, joka on muokattu yhdistetyn tappoketjun pohjalta. Tappoketjun analysoinnin pohjalta saadut tulokset tulkittiin strategisen kulttuurin teorian avulla. Tutkimustuloksista k\u00e4y ilmi, ett\u00e4 Ven\u00e4j\u00e4n kyberoperaatiot ovat muuttuneet sek\u00e4 tavoitteiltaan ett\u00e4 rakenteeltaan kymmenen vuoden aikana. Ensimm\u00e4iset kyberoperaatiot toteutettiin ideologisista syist\u00e4, eik\u00e4 niill\u00e4 saavutettu juuri lyhytaikaisia vaikutuksia suurempaa lopputulosta. Liettuaa vastaan suoritetun operaation j\u00e4lkeen operaatiot ovat olleet monimutkaisempia, paremmin suunniteltuja, ne on toteutettu geopoliittisista syist\u00e4 ja niill\u00e4 on tavoiteltu pitempiaikaista hy\u00f6ty\u00e4. Kirjallisuuskatsauksen perusteella l\u00f6ydetyt mallintamisen menetelm\u00e4t eiv\u00e4t my\u00f6sk\u00e4\u00e4n sovellu t\u00e4ysin kyberoperaatioiden analysointia varten, sill\u00e4 n\u00e4m\u00e4 ovat suunniteltu kyberhy\u00f6kk\u00e4yksien analysointia varten. Mallille, joka on kehitetty kyberoperaatioiden analysointia varten, on siis tarvetta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In 2007, Russia conducted a cyber operation against Estonia. This was the first time when a country was attacked by another country through cyber environment. Even though the operation caused only minimal losses, the Western democracies realised that this was only a precedent. Afterwards, Russia has conducted multiple cyber operations against its neighbouring countries. These countries have typically been post-Soviet republics, which have tried to distance themselves from Russia. Cyber operations have been conducted against these countries after they had moved closer to the Western sphere of influence, or after Russia had deemed that these countries threaten the geopolitical objectives of Russia. The focus of this thesis is on the cyber operations that Russia has carried out between 2007 and 2017. The research strategy used in the study was a multiple case study strategy, which is especially useful when the researcher is interested in multiple cases. This research is based on the postpositivist paradigm. The literature review focused on defining the concepts of attribution and cyber operation, explaining the different cyber operations Russia has carried out against neighbouring countries, and presenting different kinds of attacking modelling techniques. Based on the literature review, six different cyber operations were chosen for the analysis: cyber operations against Estonia, Lithuania, Georgia and three different operations against Ukraine. A modified unified kill chain attacking modelling technique was chosen as the analysis tool. Strategic culture theory was used to explain the results. The results show that the goals and the structure of the Russian cyber operations have changed over the course of a decade. The first operations were based on ideological reasons, and they did not achieve any long-term goals. After the operation against Lithuania, these cyber operations were better planned, more complex, based on geopolitical reasons and they strived for longer-term results. A need for the development for a separate cyber operation modelling technique was also recognized for most of the current techniques are developed for cyber-attack analysis.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-18T12:28:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-18T12:28:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "121", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberoperaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "strategisen kulttuurin teoria", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yhdistetty tappoketju", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4yksen mallintamisen menetelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ven\u00e4j\u00e4n l\u00e4hialueillaan toteuttamien kyberoperaatioiden analysointi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005183286", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Ven\u00e4j\u00e4", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|