fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Viitanen, Niklas", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-11-02T06:19:00Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-11-02T06:19:00Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72419", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kirjallisuuskatsauksessa k\u00e4sitell\u00e4\u00e4n kyberrikollisuutta ja kyberrikosten tutkimista. Kyberrikollisuus on kasvava uhka yhteiskunnassa ja siksi kyberrikollisuuden ja kyberrikostutkinnan tarkastelu onkin t\u00e4rke\u00e4\u00e4. Kyberavaruudessa on paljon erilaisia tapoja tehd\u00e4 suorasti tai ep\u00e4suorasti rikoksia. Erilaiset haittaohjelmat ovat yksi yleisimmist\u00e4 arjessa kohdattavista kyberuhista, mutta kyberrikoksissa k\u00e4ytet\u00e4\u00e4n my\u00f6s monia muita v\u00e4lineit\u00e4 ja tapoja, joita esimerkiksi hakkerit hy\u00f6dynt\u00e4v\u00e4t. Yksi kyberrikostutkinnan teht\u00e4vist\u00e4 on selvitt\u00e4\u00e4 rikoksen tekij\u00e4, ja siksi t\u00e4ss\u00e4 tutkielmassa keskityt\u00e4\u00e4n tarkastelemaan, ketk\u00e4 tekev\u00e4t kyberrikoksia ja mihin tarkoituksiin. Lis\u00e4ksi tutkielmassa avataan hakkerien motiiveja. Yksi merkitt\u00e4vist\u00e4 havainnoista kirjallisuuskatsauksessa on kyberrikollisuuden luokittelu, jossa esitettiin tarkemmat kategoriat kuin yksinkertaisemmassa kaksijakoisessa jaottelussa. Kyberrikollisuus on muodostunut suhteellisen isoksi liiketoiminnaksi, ja sen aiheuttamat vahingot ovat nousseet merkitt\u00e4v\u00e4sti viime vuosina. Vaikka kyberrikollisuutta esiintyy maailmanlaajuisesti, silti esimerkiksi mantereiden v\u00e4lisi\u00e4 eroja l\u00f6ytyy, joiden syit\u00e4 kirjallisuuskatsaus tarkastelee. Kirjallisuuskatsauksessa kyberrikostutkintaa l\u00e4hestyt\u00e4\u00e4n enemm\u00e4n kyberrikostutkinnan suorittamisen n\u00e4k\u00f6kulmasta ja pyrit\u00e4\u00e4n avaamaan kyberrikostutkinnan prosessia. Prosessimalleja on kehitetty ak-tiivisesti vuosituhannen alusta, mutta mik\u00e4\u00e4n tarkastelluista malleista ei ole viel\u00e4 noussut ylitse muiden. Prosessimallien tarkastelussa n\u00e4kyy selke\u00e4sti l\u00e4pileikkaus erilaisista tarpeista ja aikakausista, joiden pohjalta mallit ovat muodostettu. Tietoj\u00e4rjestelmien suunnittelu- ja toteutusvaiheessa kuuluisi ottaa huomioon kyberrikostutkintaan kuuluvia ominaisuksia, joilla voidaan edesauttaa kyberrikostutkinnan eri vaiheita. K\u00e4yt\u00e4nn\u00f6n toteutukset eiv\u00e4t kuiten-kaan ole niin yksinkertaisesti toteutettavissa ja erilaisilla kyberrikostutkintaa hy\u00f6dytt\u00e4vill\u00e4 ratkaisuilla on my\u00f6s omat haasteensa. Lis\u00e4ksi kyberrikolliset pystyv\u00e4t kehitt\u00e4m\u00e4\u00e4n vastatoimia kyberrikostutkintaa hy\u00f6dytt\u00e4ville ominaisuuksille, mik\u00e4 aiheuttaa kehitt\u00e4misen n\u00e4k\u00f6kulmasta ongelmia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis addresses cybercrime and cyber forensics. Cybercrime is a growing threat to society and that is why it is important to look at cybercrime and cybercrime investigation. In cyberspace, there are many ways to commit crimes, either directly or indirectly. Various types of malware are one of the most common cyber threats in everyday life, but cybercrime also takes ad-vantage of many other tools and methods that are exploited by hackers, for example. One of the objectives of a cybercrime investigation is to find out the perpetrator of the crime. Therefore, this study inspects who commits cybercrimes, for what purposes, and explains some of the motives of hackers. A significant finding in the literature review was the categorization of cybercrimes, which presented more specific categories for cybercrime than the easier two-part classification. Cybercrime has become a relatively large business and the damage it causes has increased significantly in recent years. All in all, cybercrime is a global threat. For example, there are differences between continents, the causes of which are examined in this thesis. The study takes a more cyber-crime investigation approach from the perspective of conducting a cybercrime investigation and seeks to examine the cybercrime investigation process. Process models have been actively developed since the turn of the millennium, but none of the models examined have yet risen above the others. An examination of process models clearly shows a cross-section of the different needs and eras on the basis of which the models are formed. The design and implementation of information systems should consider the execution of cybercrime investigation and what factors can contribute to it being more effective. However, practical implementations are not so simple to implement and various solutions that benefit cybercrime investigation also have their own challenges. In addition, cybercriminals are able to develop countermeasures to features that benefit cybercrime investigation, which poses problems from a development perspective.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-11-02T06:19:00Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-11-02T06:19:00Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "42", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberrikostutkinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "digitaalinen tutkinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberrikostutkintaan vaikuttavat tietoj\u00e4rjestelmien ominaisuudet", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202011026460", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|