fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tulisalo, Jooel", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-11-10T07:15:43Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-11-10T07:15:43Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72547", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Keskustelu tietoturvallisuudesta on lis\u00e4\u00e4ntynyt viime aikoina runsaasti. IT-alan ammattilaisten keskuudessa on vahva konsensus siit\u00e4, ett\u00e4 salasana on riitt\u00e4m\u00e4t\u00f6n mekanismi tietoturvalliseen autentikointiin. T\u00e4ss\u00e4 pro gradu -tutkimuksessa tutkittiin salasanoja ja vaihtoehtoisia autentikointimenetelmi\u00e4 sek\u00e4 etenkin monivaiheiseen tunnistautumiseen liittyvi\u00e4 kokemuksia k\u00e4ytt\u00e4j\u00e4n n\u00e4k\u00f6kulmasta. Ihmisten salasanoista ja salasanak\u00e4ytt\u00e4ytymisest\u00e4 johtuen salasanat autentikointimenetelm\u00e4n\u00e4 on turvallisuuden kannalta vajavainen. Monivaiheinen tunnistautuminen on tullut paikkaamaan t\u00e4t\u00e4 aukkoa. Empiirinen osuus toteutettiin puoliavoimena teemahaastatteluna ja haastateltavia oli yhdeks\u00e4n. Olennaisimpana tuloksena t\u00e4ss\u00e4 tutkimuksessa l\u00f6ydettiin, ett\u00e4 monivaiheinen tunnistautuminen on varsin toimiva keino turvallisuuden parantamiseen. Sen k\u00e4ytt\u00f6\u00f6n ja k\u00e4ytett\u00e4vyyteen ei liity juurikaan ongelmia, jolloin se on helppo ottaa k\u00e4ytt\u00f6\u00f6n yksityisel\u00e4m\u00e4ss\u00e4 sek\u00e4 yrityksiss\u00e4. Toisena t\u00e4rke\u00e4n\u00e4 asiana havaittiin, ett\u00e4 k\u00e4ytt\u00e4j\u00e4t eiv\u00e4t ole juurikaan varautuneet laitteen rikkoontumiseen tai katoamiseen, eli suurin osa ei tiennyt mit\u00e4 autentikointiin k\u00e4ytett\u00e4v\u00e4n laitteen rikkoontumisesta voi seurata. Viimeisen\u00e4 havainnoitiin, ett\u00e4 tietoturvatietoisuuden lis\u00e4\u00e4minen voi parantaa salasanak\u00e4ytt\u00e4ytymist\u00e4 sek\u00e4 edist\u00e4\u00e4 monivaiheisen tunnistautumisen k\u00e4ytt\u00f6\u00f6nottoa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "There is lot of discussion about cybersecurity nowadays. IT professionals have consensus that passwords are not reliable enough to be the major authentication method anymore. In this master\u2019s thesis, the main research point was alternative authentication methods and multi factor authentication and the experiences of usage of those. In the research. The main problem with passwords as authentication method is user\u2019s bad password behavior, therefore the multi factor authentication should be implemented broadly to increase the security of authentication. The empirical study was done by using half-open theme interview and there were 9 participants. The main finding of this research was that multi factor authentication is pretty good method to increase the security. The implementation and usage were easy and simple and there were just minor problems with usage, even for not so tech savvy person. The second finding was that users are not well prepared for the loss of the equipment used to verify the multi factor authentication. The third finding was that by giving education and training in cyber security and good password manners the usage of multi factor authentication could also increase.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-11-10T07:15:43Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-11-10T07:15:43Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "52", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "monivaiheinen tunnistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "autentikointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "salasanak\u00e4ytt\u00e4ytyminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kohti parempaa tietoturvaa : tutkimus monivaiheisesta tunnistautumisesta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202011106587", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "identifiointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|