fullrecord |
[{"key": "dc.contributor.advisor", "value": "Riekkinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Neero, Markus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-06-12T13:12:05Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-06-12T13:12:05Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/69911", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Informaatioteknologian kuluttajistuminen on synnytt\u00e4nyt ilmi\u00f6n, jossa ty\u00f6ntekij\u00e4t k\u00e4ytt\u00e4v\u00e4t omia mobiililaitteitaan ty\u00f6ntekoon, ajasta ja paikasta riippumatta. T\u00e4t\u00e4 ilmi\u00f6t\u00e4 kutsutaan termill\u00e4 Bring Your Own Device eli BYOD. BYOD ei viittaa pelk\u00e4st\u00e4\u00e4n mobiililaitteiden k\u00e4ytt\u00f6\u00f6n, vaan siihen voi sis\u00e4lty\u00e4 my\u00f6s ty\u00f6ntekij\u00f6iden k\u00e4ytt\u00e4m\u00e4t ohjelmistot ja palvelut. Koska BYOD mahdollistaa ty\u00f6nteon my\u00f6s ty\u00f6paikan ulkopuolelta, on ty\u00f6ntekij\u00f6ill\u00e4 my\u00f6s aina p\u00e4\u00e4sy organisaation palveluihin ja dataan. BYOD tuottaa paljon hy\u00f6tyj\u00e4 niin ty\u00f6ntekij\u00f6ille, kuin my\u00f6s ty\u00f6nantajille. Se lis\u00e4\u00e4 ty\u00f6ntekij\u00f6iden tuottavuutta, sek\u00e4 lis\u00e4\u00e4 heid\u00e4n tyytyv\u00e4isyytt\u00e4\u00e4n, itsen\u00e4isyytt\u00e4\u00e4n ja vapauttaan. Ty\u00f6nantajat saattavat s\u00e4\u00e4st\u00e4\u00e4 esimerkiksi laitekustannuksissa. BYOD aiheuttaa organisaatioille kuitenkin my\u00f6s huomattavia tietoturvariskej\u00e4. L\u00e4hdekirjallisuuden perusteella muun muassa haittaohjelmat, palvelunestohy\u00f6kk\u00e4ykset, sosiaalinen manipulointi, laitteiden katoaminen, sek\u00e4 ty\u00f6ntekij\u00f6iden oma huolimaton tai v\u00e4linpit\u00e4m\u00e4t\u00f6n toiminta ovat tietoturvariskej\u00e4, joita organisaatiot kohtaavat BYOD-ymp\u00e4rist\u00f6ss\u00e4. Tietoturvauhat saattavat toteutuessaan muun muassa vahingoittaa organisaation j\u00e4rjestelmi\u00e4 ja est\u00e4\u00e4 niiden oikeanlaisen toiminnan, sek\u00e4 aiheuttaa organisaation datan vuotamisen ulkopuoliselle taholle. Tietoturvariskien hallintaan voidaan kuitenkin k\u00e4ytt\u00e4\u00e4 useita eri tietoj\u00e4rjestelmi\u00e4 ja teknologioita. Mobiililaitehallintaj\u00e4rjestelm\u00e4t, mobiilisovellushallintaj\u00e4rjestelm\u00e4t ja mobiilisis\u00e4ll\u00f6n hallintaj\u00e4rjestelm\u00e4t ovat esimerkkej\u00e4 tietoj\u00e4rjestelmist\u00e4, joita voidaan k\u00e4ytt\u00e4\u00e4 tietoturvauhkien hallintaan BYOD-ymp\u00e4rist\u00f6ss\u00e4. Lis\u00e4ksi markkinoilla on n\u00e4it\u00e4 kaikkia eri j\u00e4rjestelmi\u00e4 yhdistelevi\u00e4 kokonaisratkaisuja, joita kutsutaan yleisesti yritysten mobiiliuden hallinnaksi. T\u00e4m\u00e4n lis\u00e4ksi tietoturvauhkia vastaan voidaan puolustautua kontrolloimalla p\u00e4\u00e4sy\u00e4 tietoverkkoihin, sek\u00e4 k\u00e4ytt\u00e4m\u00e4ll\u00e4 erilaisia virtualisointitekniikoita. Tutkielmassa kuitenkin havaittiin, ett\u00e4 kaikissa hallintateknologioissa on rajoitteita, eik\u00e4 mik\u00e4\u00e4n niist\u00e4 anna t\u00e4ytt\u00e4 suojaa esimerkiksi kehittyneit\u00e4 haittaohjelmia vastaan. T\u00e4m\u00e4n tutkielman tarkoitus oli selvitt\u00e4\u00e4 mink\u00e4laisia tietoturvauhkia organisaatiot kohtaavat BYOD-ymp\u00e4rist\u00f6ss\u00e4, ja mink\u00e4laisilla teknisill\u00e4 ratkaisuilla niit\u00e4 voidaan hallita. Tutkielma toteutettiin kirjallisuuskatsauksena ja sen tulokset perustuvat t\u00e4ysin l\u00e4hdekirjallisuuteen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-06-12T13:12:05Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-06-12T13:12:05Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "40", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "BYOD", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "mobiililaitehallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvariskit ja niiden hallinta BYOD-ymp\u00e4rist\u00f6ss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202006124156", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiililaitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|