fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Laur\u00e9n, Andrei", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Virta, Tiina", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-11T07:25:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-11T07:25:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73112", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "ISMS eli tietoturvan hallintamalli on joukko prosesseja ja politiikkoja, joiden tarkoituksena on ohjata ja hallinnoida organisaation arkaluontoista dataa. Se v\u00e4hent\u00e4\u00e4 riskej\u00e4 ja turvaa jatkuvuudenhallintaa ja sill\u00e4 hallinnoidaan k\u00e4yt\u00f6ss\u00e4 olevia prosesseja, dataa ja teknologioita. Hallintamallin tulee olla yhteensopiva voimassa olevien lakien ja asetusten kanssa. Terveyden ja hyvinvoinnin laitos (THL) suunnittelee ISO 27001 -sertifikaatin hankkimista tulevaisuudessa. Tutkimuksen teht\u00e4v\u00e4n\u00e4 oli kartoittaa, millainen hallintamalli THL:n tulisi ottaa k\u00e4ytt\u00f6\u00f6n, jotta ISO 27001 -standardin vaatimukset t\u00e4yttyv\u00e4t sek\u00e4 miten organisaation tietoturvavastuut tulisi jakaa.\n\nTutkimuksessa tarkasteltiin ensin tietoturvan hallintamalleja ja standardeja yleisell\u00e4 tasolla. Sitten k\u00e4ytiin tarkasti l\u00e4pi ISO 27001 -standardi ja THL:n nykytila. Ty\u00f6ss\u00e4 oli haasteena juuri samaan aikaan meneill\u00e4\u00e4n oleva THL:n organisaatio- ja johtamisuudistus, mutta tutkimus perustettiin johonkin tiettyn\u00e4 ajankohtana olevaan hetkeen ja tehtiin sen verran v\u00e4lj\u00e4sti, ett\u00e4 sit\u00e4 on helppo muokata muutosten j\u00e4lkeen.\n\nLopputuloksena syntyi standardin vaatimusten mukainen Excel-taulukko, joka auttaa sertifikaatin hankkimisen alkaessa ty\u00f6kaluna. Ty\u00f6kalu sis\u00e4lt\u00e4\u00e4 kaikki standardin tietoturva- ja riskinhallintavaatimukset, ehdotukset organisaation vastuutahoiksi sek\u00e4 ehdotetut asiakirjat, joilla voidaan todistaa vaatimuksenmukaisuus.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "An information security management system (ISMS), is a set of processes and policies designed to guide and manage an organization\u2019s sensitive data. It reduces risks, secures continuity management and manages existing processes, data and technologies. The governance model must be compatible with applicable laws and regulations. Finnish Institute for Health and Welfare (THL) is planning to obtain ISO 27001 certification in the future. The task of this study was to map out what kind of management model THL should implement in order to meet the requirements of the ISO 27001 standard and how the organisation's information security responsibilities should be divided.\n\nAt first, the study looked at different information security management models and existing security standards. The ISO 27001 standard and THL's present state were then carefully reviewed. The challenge was the ongoing organizational and management reform of THL, but the study was set up to a point in time and was done so loosely that it could be easily modified after the changes.\n\nThe result of the study was an Excel spreadsheet that meets the requirements of the standard, helping to get certification started, as a tool. The tool includes all the security and risk management requirements of the standard, proposals for the organisation's responsible parties, and proposed documents that can be used to prove compliance.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-11T07:25:03Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-11T07:25:03Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "116", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO27001", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvajohtaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hallintamalli", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISMS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012117058", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "public", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|