fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Viinikainen, Ari", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tammelin, Jussi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-02-17T06:41:05Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-02-17T06:41:05Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/74270", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Eri julkisia organisaatioita kohtaan on tapahtunut viime vuosi useita onnistuneita ja julkisuuteen nousseita kyberhy\u00f6kk\u00e4yksi\u00e4. Vuonna 2019 muun muassa Lahden ja Kokem\u00e4en kaupunkien tietoj\u00e4rjestelmiin toteutettiin onnistuneet hy\u00f6kk\u00e4ykset. Hy\u00f6kk\u00e4ysten tekninen tutkinta ja siit\u00e4 teht\u00e4v\u00e4t analyysit kuuluvat poliisille, mutta kuntien tietoturvallisuuden ohjausta voidaan tutkia hy\u00f6kk\u00e4ysten viitekehyksess\u00e4. T\u00e4ss\u00e4 tutkimuksessa tutkittiin n\u00e4it\u00e4 kahta onnistunutta kyberhy\u00f6kk\u00e4yst\u00e4 ja selvitettiin, miten kaupunkien tietoturvapolitiikka vaikutti hy\u00f6kk\u00e4ysten torjuntaan, rajaamiseen sek\u00e4 niist\u00e4 palautumiseen. Teoreettinen pohja rakennettiin asiakirjatutkimuksella tietoturvastrategiasta ja politiikasta, lains\u00e4\u00e4d\u00e4nn\u00f6st\u00e4 sek\u00e4 tietoturvan hallintaj\u00e4rjestelmist\u00e4. Tapaustutkimus toteutettiin asiantuntijoiden haastattelulla. Tutkimusten tulosten perusteella voidaan p\u00e4\u00e4tell\u00e4, ett\u00e4 tietoturvastrategian ja -politiikan sis\u00e4lt\u00f6\u00e4 on m\u00e4\u00e4ritelty riitt\u00e4v\u00e4sti k\u00e4ytett\u00e4v\u00e4ksi kunnissa, lains\u00e4\u00e4d\u00e4nt\u00f6\u00e4 on Suomessa paljon ja se on hajanaista sek\u00e4 tietoturvan hallintaj\u00e4rjestelm\u00e4\u00e4 voidaan k\u00e4ytt\u00e4\u00e4 julkisessa organisaatiossa. Varsinaisten tapausten tutkimuksessa selvisi, ett\u00e4 tutkimuskohteiden tietoturvapolitiikat olivat rakenteellisesti varsin erilaisia, niiden muodostamiseksi ei ollut kunnollista ohjausta ja Kokem\u00e4en tietoturvapolitiikalla oli suurempi merkityst\u00e4 kyberhy\u00f6kk\u00e4yksen torjunnassa kuin Lahdessa. Tutkimuksen tulosten perusteella l\u00f6ytyi useita eri osa-alueita, joi-hin tutkimusta voidaan laajentaa ja konkreettisia toimenpiteit\u00e4, joilla kuntien tietoturvapolitiikkaa voidaan parantaa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "There have been a number of successful and publicized cyber-attacks against various public organizations over the past year. In 2019, successful attacks were carried out on the information systems of the cities of Lahti and Kokem\u00e4ki, among others. The technical investigation and analysis of attacks is the responsibility of the police, but municipal information security guidance can be examined in the context of these attacks. This thesis examined these two successful cyber-attacks and examined how urban security policies affected the prevention, containment, and recovery from these attacks. The theoretical basis was built through document research on information security strategy and policy, legislation, and information security management systems. The case study was conducted through an interview with experts. Based on the results of the research, it can be concluded that the content of the in-formation security strategy and policy has been sufficiently defined for use in municipalities, there is a lot of legislation in Finland and it is fragmented, and the information security management system can be used in a public organization. The study of the actual cases revealed that the information security policies of the research subjects were structurally quite different, there was no proper guidance for their formation, and Kokem\u00e4ki's information security policy in particular had a important role in combating cyber-attacks. Based on the results of the study, several different areas were found to which the study can be extended and concrete measures to improve the information security policy of municipalities.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-02-17T06:41:05Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-02-17T06:41:05Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "72", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvastrategia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuuden hallintaj\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvastrategian ja -politiikan merkitys kyberhy\u00f6kk\u00e4yksen torjunnassa kunnissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202102171681", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kunnat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "julkinen hallinto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|