fullrecord |
[{"key": "dc.contributor.advisor", "value": "Niemenmaa, Marko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Siltainsuu, Janne", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-06-22T09:25:20Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-06-22T09:25:20Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/70094", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 pro gradu- tutkielma k\u00e4sittelee salasanan hallintaj\u00e4rjestelmi\u00e4. Tutkielmassa\nk\u00e4sitelt\u00e4v\u00e4t salasanan hallintaj\u00e4rjestelm\u00e4t ovat salasanojen hallinta muistamalla,\nsalasanojen hallinta paperilla ja salasanan hallinta digitaalisella salasanan\nhallintaj\u00e4rjestelm\u00e4ll\u00e4. Digitaaliset salasanan hallintaj\u00e4rjestelm\u00e4t jaetaan kahteen\np\u00e4\u00e4luokkaan sen perusteella, tallennetaanko salasanat sis\u00e4lt\u00e4 tietokanta\nk\u00e4ytt\u00e4j\u00e4n oman laitteen kiintolevylle vai palveluntarjoajan pilvipalveluun. Pro\ngradu- tutkielmassa k\u00e4sitell\u00e4\u00e4n ensin salasanoihin liittyvi\u00e4 seikkoja, kuten salasanojen\nk\u00e4sittely\u00e4 verkkopalveluissa, k\u00e4ytt\u00f6\u00e4 ihmisten n\u00e4k\u00f6kulmasta sek\u00e4 yleisesti\nhaitallisimpia salasanan hallintatapoja. Salasanan hallintaj\u00e4rjestelm\u00e4t esitell\u00e4\u00e4n\np\u00e4\u00e4piirteitt\u00e4in. Tutkimuksen empiirisess\u00e4 vaiheessa haastateltiin laadullisen\ntutkimuksen keinoin salasanan hallintaj\u00e4rjestelmi\u00e4 k\u00e4ytt\u00e4vi\u00e4 ja niit\u00e4 ei k\u00e4ytt\u00e4vi\u00e4\nhenkil\u00f6it\u00e4. Keskeisimm\u00e4t l\u00f6yd\u00f6kset tutkimuksessa esitt\u00e4v\u00e4t, ett\u00e4 t\u00e4ll\u00e4 hetkell\u00e4\nsalasanoihin liittyv\u00e4t suurimmat uhat ovat salasanojen heikko laatu sek\u00e4\nsalasanojen uudelleen k\u00e4ytt\u00e4minen. Salasanojen uudelleen k\u00e4ytt\u00e4minen asettaa\nk\u00e4ytt\u00e4j\u00e4n salasanat laadusta riippumatta uhan alaisuuteen, sill\u00e4 salasanoja varastetaan\njatkuvasti verkkopalveluista. Kun k\u00e4ytt\u00e4j\u00e4 uudelleen k\u00e4ytt\u00e4\u00e4 salasanoja,\non silloin yhdest\u00e4 palvelusta vuotanut salasana avain kaikkiin k\u00e4ytt\u00e4j\u00e4n muihin\npalveluihin. T\u00e4t\u00e4 voidaan v\u00e4ltt\u00e4\u00e4 k\u00e4ytt\u00e4m\u00e4ll\u00e4 ainutlaatuisia salasanoja jokaisessa\npalvelussa, joka v\u00e4ist\u00e4m\u00e4tt\u00e4 ajaa k\u00e4ytt\u00e4j\u00e4n ongelmaan, jossa h\u00e4nen on mahdotonta\nmuistaa kaikkia salasanojaan. T\u00e4h\u00e4n vastauksena on otettava k\u00e4ytt\u00f6\u00f6n jokin\ndigitaalisessa ymp\u00e4rist\u00f6ss\u00e4 toimiva salasanan hallintaj\u00e4rjestelm\u00e4. Tutkimuksessa\ntodettiin, ett\u00e4 k\u00e4ytett\u00e4vyyden ja tietoturvan n\u00e4k\u00f6kulmasta parhaaseen ja\nk\u00e4ytett\u00e4vimp\u00e4\u00e4n lopputulokseen p\u00e4\u00e4st\u00e4\u00e4n, kun salasanan hallintaj\u00e4rjestelm\u00e4 on\npilvipohjainen, siihen on asetettu vahva p\u00e4\u00e4salasana, joka ei ole k\u00e4yt\u00f6ss\u00e4 muualla\nsek\u00e4 palvelussa on k\u00e4yt\u00f6ss\u00e4 kaksi vaiheinen tunnistaminen. N\u00e4in voidaan\nv\u00e4ltt\u00e4\u00e4 salasanojen uudelleen k\u00e4ytt\u00e4minen sek\u00e4 k\u00e4ytt\u00e4\u00e4 generoituja merkityksett\u00f6mi\u00e4\nsalasanoja joka palvelussa. N\u00e4in voidaan toimia sill\u00e4, k\u00e4ytt\u00e4j\u00e4n ei tarvitse\nmuistaa salasanoja itse. K\u00e4ytt\u00e4j\u00e4n tarvitsee en\u00e4\u00e4 muistaa ainoastaan yksi salasana,\njonka avulla h\u00e4n p\u00e4\u00e4see k\u00e4siksi muihin salasanoihin. Empiirisen osion mukaan\nk\u00e4ytt\u00e4j\u00e4t my\u00f6s kokevat t\u00e4m\u00e4n k\u00e4yt\u00e4nn\u00f6lliseksi ja j\u00e4rkev\u00e4ksi tavaksi k\u00e4sitell\u00e4\nk\u00e4ytt\u00e4j\u00e4tunnuksia ja salasanoja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This pro gradu thesis is focusing in password management systems. Thesis will\ngo through three different password management systems, which are remembering\npasswords, writing passwords down and using a digital password management\nsoftware. Digital password management systems are divided in to two\nmain groups by the meaning which they save users passwords. These two ways\nare saving them to the users\u2019 hard drive and to a cloud service provided by the\npassword management system. Thesis will first handle password related topics\nand then go through the three ways to handle the passwords. The study was\nmade by interviewing persons that used a digital password management software\nand people who did not. These results were compared to each other. Important\nfindings during the study were that password related threats focus on\npassword reuse and using weak passwords. Password reuse is harmful because\nof the fact that passwords get stolen from the services databases all the time.\nWhen passwords are reused and the password leaks from one service, it means\nthat the password can be used to log in as the user to multiple services. This can\nbe managed by using a different password to every service that the user uses.\nThis creates a problem, that the users cannot remember many passwords and the\nanswer to that is to use a password manager that works in the digital environment.\nThe findings suggest that the best way when balancing usability and information\nsecurity is to use a cloud-based password manager, generate meaningless\nstrings of characters as passwords to services, have a strong master password to\nthe manager and have two factor authentications enabled in the service. By using\nthis technique, the user can avoid password reuse and still maintain usability.\nThis also means, that the user has to remember only one password in order to\naccess all the other passwords. The interview part suggests also that this kind of\na way to handle passwords is found practical and reasonable by users using it as\nway to handle their passwords.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-06-22T09:25:20Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-06-22T09:25:20Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "72", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "salasanan hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "salasana", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "salasanan hallintaohjelma", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "salasanavuoto", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "pilvipohjainen salasanan hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "salasanojen uudelleenk\u00e4ytt\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Salasanan hallintamenetelmien k\u00e4ytt\u00f6\u00f6noton mahdollistajat ja esteet", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202006224297", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietomurto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|