fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tuovila, Roope", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-06-12T12:45:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-06-12T12:45:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/69909", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Jatkuvasti verkottuvassa maailmassa turvallisella tiedon k\u00e4sittelyll\u00e4 on yh\u00e4\nkasvavampi rooli yritysten liiketoiminnan jatkuvuuden kannalta. H\u00e4iri\u00f6tilanteisiin on varauduttava. Standardoidulla tietoturvallisuuden hallintaj\u00e4rjestelm\u00e4ll\u00e4 ja tavoitteellisella jatkuvuussuunnittelulla kyet\u00e4\u00e4n varautumaan mahdollisiin liiketoiminnan keskeytyksiin ja toipumaan niist\u00e4 nopeasti. T\u00e4m\u00e4n vuoksi\nyh\u00e4 useammat yritykset p\u00e4\u00e4tt\u00e4v\u00e4t hakea tietoturvasertifikaatteja. Suomen Erillisverkot -konserniin kuuluva Leijonaverkot Oy l\u00e4hti tavoittelemaan ISO 27001 -\nsertifikaattia vuonna 2019. Sertifiointiprojektin osana toteutettiin jatkuvuussuunnitteluprojekti, jonka tuloksena toteutettiin yrityksen jatkuvuussuunnitelma. Jatkuvuussuunnittelu toteutettiin VAHTI 2/2016 Toiminnan jatkuvuuden\nhallinta -ohjeen mukaisesti. Tutkimus pyrki l\u00f6yt\u00e4m\u00e4\u00e4n parhaat k\u00e4yt\u00e4nn\u00f6t yrityksen jatkuvuussuunnitteluun. Tavoitteena oli selvitt\u00e4\u00e4, miten Leijonaverkot\nOy:n jatkuvuuden hallinta on toteutettava, miten toimintaa voidaan kehitt\u00e4\u00e4 ja\nmiten ISO 27001 -standardin vaatimukset vaikuttavat jatkuvuussuunnittelun\ntoteutukseen. Tutkimuksen teoriaosuudessa perehdyttiin tietoturvallisuuden ja\njatkuvuuden hallinnan teoriaperusteisiin ja k\u00e4sitteisiin sek\u00e4 esiteltiin kirjallisuuden pohjalta viisi erilaista jatkuvuussuunnittelumallia. Tutkimuksen empiirinen osuus toteutettiin tapaustutkimuksena (Single Case Study), jossa havainnoitiin osallistuvasti yrityksen jatkuvuussuunnitteluprosessia. Suunnitteluprojektin toteutusmallia verrattiin muihin tutkimuksen teoriaosuudessa esiteltyihin jatkuvuussuunnittelumalleihin. Tutkimustulokset saavutettiin laadullisella\nsis\u00e4ll\u00f6n analyysilla. Tutkimuksen avulla l\u00f6ydettiin parhaat k\u00e4yt\u00e4nteet Leijonaverkot Oy:n jatkuvuuden hallinnan toteutukseen sek\u00e4 kehitt\u00e4miseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In the continuously networking world, secure data processing is playing an increasingly important role in the business continuity of companies. Organizations must be prepared for faults. With a standardized information security\nmanagement system and goal-oriented business continuity planning, it is possible to prepare for possible business interruptions and recover from them\nquickly. As a result, more and more companies are choosing to apply for security certificates. Leijonaverkot Oy, part of the Finnish State Networks Group, set\nout to pursue ISO 27001 certification in 2019. As part of the certification project,\na continuity planning project was implemented, which resulted in the implementation of the company's continuity plan. Business continuity planning was\ncarried out in accordance with the VAHTI 2/2016 Business Continuity Management guideline. The study sought to find best practices for the company\u2019s\nbusiness continuity planning. The aim was to find out how Leijonaverkot Oy's\nbusiness continuity management must be implemented, how operations can be\ndeveloped and how the requirements of the ISO 27001 standard affect the implementation of continuity planning. The theoretical part of the study introduces the theoretical foundations and concepts of information security and business continuity management and presents five different business continuity\nplanning models based on the literature. The empirical part of the study was\ncarried out as a Single Case Study, in which the company's continuity planning\nprocess was participatively observed. The implementation model of the design\nproject was compared with other continuity planning models presented in the\ntheoretical part of the study. The research results were obtained by qualitative\ncontent analysis. With the help of the study, the best practices were found for\nthe implementation and development of Leijonaverkot Oy's continuity management.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-06-12T12:45:23Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-06-12T12:45:23Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "84", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "jatkuvuudenhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "jatkuvuussuunnittelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ICT varautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO/IEC 27001", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "VAHTI-ohje", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Jatkuvuussuunnittelu ja sen kehitt\u00e4minen ICT-liiketoiminnassa : tapaustutkimus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202006124154", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "liiketoiminta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuusjohtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "jatkuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|