Valtiolliset kybervaikuttamisen keinot ja vaikutukset case Kiina

Tässä tutkielmassa avataan valtiollisia kybervaikuttamisen keinoja sekä vaikutuksia globaalilla tasolla. Tarkoituksena on kuvailla yleisimpiä hyökkäyskeinoja ja erilaisia kybervaikuttamisen tapoja perehtyen hyökkääjän valtiosidonnaisuuteen ja motiiviin. Tutkielmassa avataan tekijöitä, jotka erottele...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Viljamaa, Juuso
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2021
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/75367
_version_ 1828193204413923328
author Viljamaa, Juuso
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Viljamaa, Juuso Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Viljamaa, Juuso Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Viljamaa, Juuso
datasource_str_mv jyx
description Tässä tutkielmassa avataan valtiollisia kybervaikuttamisen keinoja sekä vaikutuksia globaalilla tasolla. Tarkoituksena on kuvailla yleisimpiä hyökkäyskeinoja ja erilaisia kybervaikuttamisen tapoja perehtyen hyökkääjän valtiosidonnaisuuteen ja motiiviin. Tutkielmassa avataan tekijöitä, jotka erottelevat kybersodankäynnin muista kybervaikuttamisen tavoista. Loppua kohden kuvaillaan reaalimaailman esimerkein 2000-luvun kybervaikuttamista lopussa keskittyen Kiinan kansantasavallan kybervaikuttamiseen ja vaikutuksiin. This thesis discusses the cyber actions of states and their global effects. The most used attack methods and different ways to effect are described concentrating on attackers motivations behind them as well as links to government. Factors that separate cyber warfare from other cyber actions are elaborated. Cyber actions from the 2000's are described with real world examples. The work is concluded by an overview of the cyber actions and effects of People's Republic of China.
first_indexed 2024-09-11T08:51:40Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Viljamaa, Juuso", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-05-07T06:20:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-05-07T06:20:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/75367", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa avataan valtiollisia kybervaikuttamisen keinoja sek\u00e4 vaikutuksia globaalilla tasolla. Tarkoituksena on kuvailla yleisimpi\u00e4 hy\u00f6kk\u00e4yskeinoja ja erilaisia kybervaikuttamisen tapoja perehtyen hy\u00f6kk\u00e4\u00e4j\u00e4n valtiosidonnaisuuteen ja motiiviin. Tutkielmassa avataan tekij\u00f6it\u00e4, jotka erottelevat kybersodank\u00e4ynnin muista kybervaikuttamisen tavoista. Loppua kohden kuvaillaan reaalimaailman esimerkein 2000-luvun kybervaikuttamista lopussa keskittyen Kiinan kansantasavallan kybervaikuttamiseen ja vaikutuksiin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis discusses the cyber actions of states and their global effects. The most used attack methods and different ways to effect are described concentrating on attackers motivations behind them as well as links to government. Factors that separate cyber warfare from other cyber actions are elaborated. Cyber actions from the 2000's are described with real world examples. The work is concluded by an overview of the cyber actions and effects of People's Republic of China.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-05-07T06:20:46Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-05-07T06:20:46Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "19", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberterrorismi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybervakoilu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202105072664", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Kiina", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tieto- ja viestint\u00e4rikokset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikkarikokset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_75367
language fin
last_indexed 2025-03-31T20:03:20Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/550b26b2-7dde-42b0-8fe7-451781a6e25f\/download","text":"URN:NBN:fi:jyu-202105072664.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Viljamaa, Juuso Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina kyberterrorismi kybervakoilu Tietotekniikka Mathematical Information Technology 602 kyberrikollisuus kyberturvallisuus Kiina kybersodankäynti verkkohyökkäykset tieto- ja viestintärikokset tietotekniikkarikokset
title Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina
title_full Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina
title_fullStr Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina
title_full_unstemmed Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina
title_short Valtiolliset kybervaikuttamisen keinot ja vaikutukset
title_sort valtiolliset kybervaikuttamisen keinot ja vaikutukset case kiina
title_sub case Kiina
title_txtP Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina
topic kyberterrorismi kybervakoilu Tietotekniikka Mathematical Information Technology 602 kyberrikollisuus kyberturvallisuus Kiina kybersodankäynti verkkohyökkäykset tieto- ja viestintärikokset tietotekniikkarikokset
topic_facet 602 Kiina Mathematical Information Technology Tietotekniikka kyberrikollisuus kybersodankäynti kyberterrorismi kyberturvallisuus kybervakoilu tieto- ja viestintärikokset tietotekniikkarikokset verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/75367 http://www.urn.fi/URN:NBN:fi:jyu-202105072664
work_keys_str_mv AT viljamaajuuso valtiollisetkybervaikuttamisenkeinotjavaikutuksetcasekiina