fullrecord |
[{"key": "dc.contributor.advisor", "value": "Riekkinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tams, Roope", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-07-08T06:27:06Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-07-08T06:27:06Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/71100", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kandidaatintutkielma suoritettiin kirjallisuuskatsauksena. Tarkoituksena oli luoda yleinen katsaus SCADA-j\u00e4rjestelmien kyberturvallisuuteen. SCADA-j\u00e4rjestelm\u00e4 on teollinen hallintaj\u00e4rjestelm\u00e4, joka vastaa automaatiosta laajalla maantieteellisell\u00e4 alueella. Ne vastaavat my\u00f6s kriittisen infrastruktuurin toiminnasta, kuten s\u00e4hk\u00f6nsiirrosta. Laajat ongelmat s\u00e4hk\u00f6nsiirrossa tulisivat yhteiskunnalle eritt\u00e4in kalliiksi, joten SCADA-j\u00e4rjestelmien kyberturvallisuudesta on pidett\u00e4v\u00e4 huolta.\nTeolliset hallintaj\u00e4rjestelm\u00e4t ovat perinteisi\u00e4 kuluttajaj\u00e4rjestelmi\u00e4 pitk\u00e4ik\u00e4isempi\u00e4, joten niiden kyberturvallisuudesta huolehtiminen on vaikeampaa, sill\u00e4 teknologia kehittyy jatkuvasti. J\u00e4rjestelmien kyberturvallisuutta pidet\u00e4\u00e4nkin yll\u00e4 esimerkiksi hy\u00f6kk\u00e4yspuilla. Hy\u00f6kk\u00e4yspuiden avulla voidaan arvioida hy\u00f6kk\u00e4\u00e4j\u00e4n tavoitteita ja sit\u00e4 kautta hy\u00f6kk\u00e4ystapoja, josta suoritettavan arvioinnin perusteella j\u00e4rjestelm\u00e4\u00e4kin voidaan kehitt\u00e4\u00e4.\nTunnetuimpana SCADA-hy\u00f6kk\u00e4yksen\u00e4 pidet\u00e4\u00e4n usein Stuxneti\u00e4. Se oli hy\u00f6kk\u00e4ys, joka kohdistui iranilaiseen uraanin rikastamoon. Uraanin rikastamo oli internetist\u00e4 eristetty kokonaisuus, mutta siihen saatiin tartutettua haittaohjelma saastuneella USB-muistitikulla. Haittaohjelma ei suinkaan pysynyt piilossa, vaan se oli ohjelmoitu hajottamaan uraanin rikastuksessa k\u00e4ytett\u00e4vi\u00e4 sentrifugeja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Goal of this bachelors thesis was to get overall look in SCADA-system cybersecurity field and get basic knowledge of SCADA-systems and cyberattacks which create threat to SCADA-systems. This study was made as a literature review. Name SCADA comes from words Supervisory Control And Data Acquisition. Its basic goal is to maintain automation in large geographical area, for example in electric grid.\nCybersecurity of SCADA-system is essential because it maintains critical infrastructure. SCADA-systems have very long life compared to basic consumer electronics. That makes it important to keep improving systems cybersecurity. Improving cyber security is not easy, one main reason is that system itself might be quite old, but technologies around SCADA have evolved and new kind of threats have emerged.\nStuxnet is usually being kept as the most famous SCADA attack. Attack was targeted to Iranian uranium plant. Stuxnets was programmed to break cen-trifuges in the plant and therefore slow down Irans nuclear program.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-07-08T06:27:06Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-07-08T06:27:06Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "SCADA-j\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kriittinen infrastruktuuri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "SCADA-j\u00e4rjestelm\u00e4\u00e4n kohdistuvat kyberhy\u00f6kk\u00e4ykset ja niilt\u00e4 suojautuminen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202007085272", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|