fullrecord |
[{"key": "dc.contributor.advisor", "value": "Marttiin, Pentti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pajala, Erno", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-28T10:28:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-28T10:28:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73456", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kandidaatintutkielma on tutkimus Yhdysvaltojen demokraattinen kansallinen komitean reagoinnista ja toimenpiteist\u00e4, kun Ven\u00e4j\u00e4 hakkeroitui komitean tietoverkkoihin. Tutkielma tarkastelee nimenomaisesti sit\u00e4, tekik\u00f6 komitea oikeat toimenpiteet.\nVen\u00e4j\u00e4 hakkeroi Yhdysvaltojen demokraattipuolueen vuosina 2015 ja 2016 ennen Yhdysvaltojen presidentinvaaleja. Tapahtumia on analysoitu k\u00e4ytt\u00e4en kyberturvallisuusviitekehyst\u00e4 yhdistettyn\u00e4 tilannetietoisuusteoriaan. Tutkimus on toteutettu kirjallisuuskatsauksena.\nTutkielma k\u00e4sittelee kyberoperaatioita keskittyen kyberpuolustukseen sek\u00e4 tilannetietoisuuteen p\u00e4\u00e4t\u00f6ksenteon tarkastelussa, tietoj\u00e4rjestelm\u00e4tieteen n\u00e4k\u00f6kulmasta. Tilannetietoisuus on t\u00e4rke\u00e4 osa p\u00e4\u00e4t\u00f6ksentekoa, joka voi olla helposti puutteellista monista tekij\u00f6ist\u00e4 riippuen. \nTarkasteltuja tapauksia on kolme. Ensimm\u00e4inen alkoi 2015 kes\u00e4ll\u00e4, kun Ven\u00e4j\u00e4 hakkeroi demokraattisen kansallisen komitean tietoverkot. Toinen tapaus koskee jo mainittua Ven\u00e4j\u00e4n hakkerointia, mutta tilannetietoisuus muuttui merkitt\u00e4v\u00e4sti toisessa tapauksessa. Kolmas tapaus alkoi 2016, kun toinen kyberoperaattori Ven\u00e4j\u00e4lt\u00e4 hakkeroi demokraattisen kansallisen komitean tietoverkot ja alkoi varastamaan tiedostoja kyseisist\u00e4 verkoista.\nT\u00e4m\u00e4 tutkielma tarkastelee, millaisia kyberoperaatioita Ven\u00e4j\u00e4 teki Yhdysvaltojen 2016 presidentinvaaleissa. Toimittiinko tilanteessa viitekehyksen mukaan ja oliko toiminta tilannetietoisuusteorian pohjalta oikeaa? Mainittuja aiheita ei ole tutkittu tilannetietoisuuden n\u00e4k\u00f6kulmasta. L\u00e4hdemateriaali kostuu osittain viranomaisten raporteista ja monipuolisista kansainv\u00e4listen mediatalojen uutisista, sill\u00e4 akateemista tutkimusta aiheesta on niukasti.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis is a research on the United States Democratic National Committee\u2019s reaction and actions when Russia hacked the Committee\u2019s networks. Thesis examines precisely, did the Committee conduct the correct actions. \nRussia hacked the United States Democratic National Committee in 2015 and 2016 before the United States presidential election. The incidents are analyzed using cyber security framework, combined with situation awareness theory. Research is done as literary review.\nThesis addresses cyber operations focusing on cyber defense and situation awareness in decision making from information system science\u2019s view-point. Situation awareness is an important part of decision making that can easily be lacking depending on different elements.\nThree incidents are examined. The first incident started in the summer of 2015 when Russia hacked the Democratic National Committee\u2019s networks. The second incident regards the already mentioned incident but situation awareness changes significantly in the second incident. The third incident started in the spring of 2016 when different a cyber operator from Russia hacked the Democratic National Committee\u2019s networks and started to steal documents from those networks.\nThis thesis examines what kind of cyber operations Russia conducted regarding the 2016 United States presidential elections. Were actions done ac-cording to cyber security framework and were reactions correct according to situation awareness theory. Mentioned subjects have not been studied from situation awareness viewpoint. Source material is partly based of government reports and from diverse selection of international media publishers\u2019 news articles, because academic research was found only sparsely.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-28T10:28:55Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-28T10:28:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "exploitation", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Situation awareness and Cyber Kill Chain when Russian cyber operators hacked Democratic National Committee", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012287388", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "p\u00e4\u00e4t\u00f6ksenteko", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tilannekuva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "decision making", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyberwarfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "situational awareness", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hacking", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|