fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kypp\u00f6, Jorma", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Numminen, Aleksanteri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-15T07:25:31Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-15T07:25:31Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73178", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberturvallisuus on alati kasvava ala, johon liittyy paljon haasteita. Se on uu-si ala, joka tarvitsee kipe\u00e4sti uutta tutkimusta. Uuden tutkimuksen avulla voidaan luoda entist\u00e4kin turvallisempia j\u00e4rjestelmi\u00e4. N\u00e4iden uusien j\u00e4rjestelmien tietoturvaa suunniteltaessa ja toteutettaessa pit\u00e4\u00e4 kuitenkin ottaa huomioon my\u00f6s k\u00e4ytett\u00e4vyysn\u00e4k\u00f6kulma. Jos k\u00e4ytett\u00e4vyytt\u00e4 ei huomioida tarpeeksi, niin j\u00e4rjestelm\u00e4n toteutus voi jopa t\u00e4ysin ep\u00e4onnistua tai j\u00e4rjestelm\u00e4\u00e4 voi olla mahdotonta k\u00e4ytt\u00e4\u00e4 tietoturvallisesti.\nK\u00e4ytett\u00e4vyys on perusta j\u00e4rjestelm\u00e4n turvalliselle k\u00e4yt\u00f6lle. Kyberturvallisuudessa on tehty erilaisia ohjenuoria ja s\u00e4\u00e4d\u00f6ksi\u00e4 siit\u00e4, miten kyberturvallisia tietoj\u00e4rjestelm\u00e4ymp\u00e4rist\u00f6j\u00e4 tulisi toteuttaa. Ottavatko n\u00e4m\u00e4 ohjeistukset kantaa j\u00e4rjestelm\u00e4n k\u00e4ytett\u00e4vyyteen? Suljetaanko merkitt\u00e4v\u00e4 osa j\u00e4rjestelm\u00e4n koko-naisturvallisuudesta ulkopuolelle ohjeistuksissa, kun k\u00e4ytett\u00e4vyydelle ei anneta sit\u00e4 merkityst\u00e4, mik\u00e4 sill\u00e4 pit\u00e4isi olla? Mit\u00e4 Suomen valtionhallinto linjaa tietoturvaohjeistuksissaan k\u00e4ytett\u00e4vyydest\u00e4?\nT\u00e4ss\u00e4 kandidaatintutkielmassa tarkoituksenani on tutkia, mik\u00e4 merkitys k\u00e4ytett\u00e4vyydell\u00e4 on kyberturvallisuudessa. Aiheesta l\u00f6ytyy jo jonkin verran tieteellist\u00e4 tutkimusta, mutta on t\u00e4rke\u00e4\u00e4 laatia niist\u00e4 yhteenveto. Tutkielmassa otetaan esille k\u00e4ytett\u00e4vyyden merkitys kyberturvallisuudessa ja tutkitaan my\u00f6s, mit\u00e4 Suomen valtionhallinnon linjaukset kyberturvallisuudesta ja tietoturvasta sanovat k\u00e4ytett\u00e4vyydest\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cybersecurity is a growing field, which includes many challenges. It is a new field that needs more research. With new research, one can create more secure systems. When designing new systems and implementing them usability must be considered as well. If usability is not considered enough, then system development may fail altogether, or it may not be possible to use the system securely.\nUsability is part of the foundation of using a system securely. In cybersecurity, there are many different guidelines and regulations about how secure systems should be developed and designed. Do these instructions on systems development include usability? Does the overall security of the system suffer when usability is not considered as it should be? What does the Finnish gov-ernment say in their security guidelines about usability?\nIn this thesis it is investigated that what significance does usability have in cybersecurity. There is some research about the subject, but it is important to create a summary of them. In addition to investigating the significance, it is also investigated whether Finnish government considers usability in their security or cybersecurity guidelines when designing or implementing systems.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-15T07:25:31Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-15T07:25:31Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "j\u00e4rjestelm\u00e4turvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "K\u00e4ytett\u00e4vyyden merkitys kyberturvallisuudessa Suomen kontekstissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012157125", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "merkitys (t\u00e4rkeys)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "j\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "valtionhallinto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Suomi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|