_version_ 1809901557033992192
annif_keywords_txtF_mv safety and security data security measurement United States of America computer viruses
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p7349 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p4794 http://www.yso.fi/onto/yso/p105078 http://www.yso.fi/onto/yso/p1293
author Laamanen, Jami
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietotekniikka Mathematical Information Technology 602
author_facet Laamanen, Jami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietotekniikka Mathematical Information Technology 602 Laamanen, Jami
author_sort Laamanen, Jami
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2020-12-28T21:01:46Z
format Pro gradu
format_ext_str_mv Opinnäyte Pro gradu
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Hardening legacy IoT-devices by retrofitting security measures</title><creator>Laamanen, Jami</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Tietotekniikka</contributor><contributor type="oppiaine" lang="en">Mathematical Information Technology</contributor><contributor type="oppiainekoodi">602</contributor><subject type="other">firmware</subject><subject type="other">hardening</subject><subject type="other">retrofitting</subject><subject type="other">SSL termination proxy</subject><subject type="other">WAF</subject><subject type="yso">emulointi</subject><subject type="yso">esineiden internet</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">emulation</subject><subject type="yso">Internet of things</subject><subject type="yso">cyber security</subject><available>2020-12-28T11:10:22Z</available><issued>2019</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master&#x2019;s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/73463</identifier><identifier type="urn">URN:NBN:fi:jyu-202012287395</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><rights type="accesslevel">restrictedAccess</rights><rights type="accessrights" lang="fi">Tekij&#xE4; ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv&#xE4;skyl&#xE4;n yliopiston kirjaston &lt;a href="https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat"&gt;arkistoty&#xF6;asemalta&lt;/a&gt;.</rights><rights type="accessrights" lang="en">&lt;br&gt;&lt;br&gt;The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival &lt;a href="https://kirjasto.jyu.fi/en/workspaces/facilities"&gt;workstation&lt;/a&gt; at Jyv&#xE4;skyl&#xE4; University Library reserved for the use of archival materials.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202012287395</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/73463/1/URN%3aNBN%3afi%3ajyu-202012287395.pdf" name="URN:NBN:fi:jyu-202012287395.pdf" type="application/pdf" length="832504" sequence="1"/><recordID>123456789_73463</recordID></qualifieddc>
id jyx.123456789_73463
language eng
last_indexed 2024-09-03T10:49:27Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/73463\/1\/URN%3aNBN%3afi%3ajyu-202012287395.pdf","text":"URN:NBN:fi:jyu-202012287395.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 602
publication_first_indexed 2019-12-28T21:01:46Z
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Laamanen, Jami Hardening legacy IoT-devices by retrofitting security measures firmware hardening retrofitting SSL termination proxy WAF emulointi esineiden internet kyberturvallisuus emulation Internet of things cyber security
subject_txtF Tietotekniikka
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_73463&index=0&size=large
title Hardening legacy IoT-devices by retrofitting security measures
title_full Hardening legacy IoT-devices by retrofitting security measures
title_fullStr Hardening legacy IoT-devices by retrofitting security measures Hardening legacy IoT-devices by retrofitting security measures
title_full_unstemmed Hardening legacy IoT-devices by retrofitting security measures Hardening legacy IoT-devices by retrofitting security measures
title_short Hardening legacy IoT-devices by retrofitting security measures
title_sort hardening legacy iot devices by retrofitting security measures
title_txtP Hardening legacy IoT-devices by retrofitting security measures
topic firmware hardening retrofitting SSL termination proxy WAF emulointi esineiden internet kyberturvallisuus emulation Internet of things cyber security
topic_facet Internet of things SSL termination proxy WAF cyber security emulation emulointi esineiden internet firmware hardening kyberturvallisuus retrofitting
url https://jyx.jyu.fi/handle/123456789/73463 http://www.urn.fi/URN:NBN:fi:jyu-202012287395
work_keys_str_mv AT laamanenjami hardeninglegacyiotdevicesbyretrofittingsecuritymeasures