Strategic cybersecurity analysis

Kyberturvallisuudessa hyökkääjällä on oletuksena etulyöntiasema ja puolustajan tehtävänä on lähinnä reagoida. Toisaalta kyberturvallisuutta ei voida pitää enää pelkästään teknisenä haasteena, vaan sillä on aikaisempaa suurempi strateginen ja geopoliittinen rooli, vaikuttaen jopa kansalliseen turvall...

Full description

Bibliographic Details
Main Author: Isokangas, Jyrki
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2021
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/75718
_version_ 1826225748225032192
author Isokangas, Jyrki
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Isokangas, Jyrki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Isokangas, Jyrki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Isokangas, Jyrki
datasource_str_mv jyx
description Kyberturvallisuudessa hyökkääjällä on oletuksena etulyöntiasema ja puolustajan tehtävänä on lähinnä reagoida. Toisaalta kyberturvallisuutta ei voida pitää enää pelkästään teknisenä haasteena, vaan sillä on aikaisempaa suurempi strateginen ja geopoliittinen rooli, vaikuttaen jopa kansalliseen turvallisuuteen. Pääosin reagoiva ja tekninen kyberturvallisuus ei kykene vastaamaan yksinään tulevaisuuden haasteisiin, vaan hyökkääjän etulyöntiasema tulisi saada siirrettyä puolustajalle. Haastava tavoite voi olla saavutettavissa strategisella analyysillä, joka kykenee tukemaan ennakoivaa ja tietoon perustuvaa kyberturvallisuuden päätöksentekoa. Tämä pro gradu -tutkimus määrittelee kyberturvallisuuden strategisen analyysin, esittelee analyysissä käytettävän mallin sekä arvioi miten analyysin tuloksia voidaan hyödyntää päätöksenteossa. Kyberturvallisuuden strategisen analyysin malli käsittää kyberuhkan, kohteena olevan informaatiojärjestelmän, kybertilan sekä näiden välisen vuorovaikutuksen. Mallin avulla kyetään tunnistamaan päätöksentekoa varten kyberturvallisuuden kehittämistarpeet ja resurssien priorisointi. The generally accepted assumption is that offensive actions have an advantage in cyberspace, and the defender's role is to react. Furthermore, cybersecurity is no longer only a technical discipline, but it is evolving towards a strategic and geopolitical concept, also impacting national security. Reactive and purely technical cybersecurity is not valid anymore. The advantage of an attacker should be changed to the defender. This challenging objective may be achieved with strategic analysis supporting proactive cybersecurity decisions. This master's thesis determines the strategic analysis of cybersecurity, presents the model for cybersecurity analysis, and assesses how the analysis results can be utilized in cybersecurity decision-making. The strategic cybersecurity analysis model includes cyber threats, target information systems, cyberspace, and their interactions. The model enables identifying requirements for cybersecurity development and resource allocation for the decision-makers.
first_indexed 2021-05-18T20:04:34Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Kari, Martti J.", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Isokangas, Jyrki", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-05-18T10:11:45Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-05-18T10:11:45Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/75718", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberturvallisuudessa hy\u00f6kk\u00e4\u00e4j\u00e4ll\u00e4 on oletuksena etuly\u00f6ntiasema ja puolustajan teht\u00e4v\u00e4n\u00e4 on l\u00e4hinn\u00e4 reagoida. Toisaalta kyberturvallisuutta ei voida pit\u00e4\u00e4 en\u00e4\u00e4 pelk\u00e4st\u00e4\u00e4n teknisen\u00e4 haasteena, vaan sill\u00e4 on aikaisempaa suurempi strateginen ja geopoliittinen rooli, vaikuttaen jopa kansalliseen turvallisuuteen. P\u00e4\u00e4osin reagoiva ja tekninen kyberturvallisuus ei kykene vastaamaan yksin\u00e4\u00e4n tulevaisuuden haasteisiin, vaan hy\u00f6kk\u00e4\u00e4j\u00e4n etuly\u00f6ntiasema tulisi saada siirretty\u00e4 puolustajalle. Haastava tavoite voi olla saavutettavissa strategisella analyysill\u00e4, joka kykenee tukemaan ennakoivaa ja tietoon perustuvaa kyberturvallisuuden p\u00e4\u00e4t\u00f6ksentekoa. T\u00e4m\u00e4 pro gradu -tutkimus m\u00e4\u00e4rittelee kyberturvallisuuden strategisen analyysin, esittelee analyysiss\u00e4 k\u00e4ytett\u00e4v\u00e4n mallin sek\u00e4 arvioi miten analyysin tuloksia voidaan hy\u00f6dynt\u00e4\u00e4 p\u00e4\u00e4t\u00f6ksenteossa. Kyberturvallisuuden strategisen analyysin malli k\u00e4sitt\u00e4\u00e4 kyberuhkan, kohteena olevan informaatioj\u00e4rjestelm\u00e4n, kybertilan sek\u00e4 n\u00e4iden v\u00e4lisen vuorovaikutuksen. Mallin avulla kyet\u00e4\u00e4n tunnistamaan p\u00e4\u00e4t\u00f6ksentekoa varten kyberturvallisuuden kehitt\u00e4mistarpeet ja resurssien priorisointi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The generally accepted assumption is that offensive actions have an advantage in cyberspace, and the defender's role is to react. Furthermore, cybersecurity is no longer only a technical discipline, but it is evolving towards a strategic and geopolitical concept, also impacting national security. Reactive and purely technical cybersecurity is not valid anymore. The advantage of an attacker should be changed to the defender. This challenging objective may be achieved with strategic analysis supporting proactive cybersecurity decisions. This master's thesis determines the strategic analysis of cybersecurity, presents the model for cybersecurity analysis, and assesses how the analysis results can be utilized in cybersecurity decision-making. The strategic cybersecurity analysis model includes cyber threats, target information systems, cyberspace, and their interactions. The model enables identifying requirements for cybersecurity development and resource allocation for the decision-makers.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-05-18T10:11:44Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-05-18T10:11:45Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "93", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "strategic", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "analysis", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "constructive research", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Strategic cybersecurity analysis", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202105182986", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "p\u00e4\u00e4t\u00f6ksenteko", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberavaruus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kansallinen turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hybridisota", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tieto- ja viestint\u00e4tekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "decision making", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyberspace", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "threats", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "national security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber attacks", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hybrid warfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "information and communications technology", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_75718
language eng
last_indexed 2025-02-18T10:54:38Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/5edf0ff0-9d34-4633-8cc3-69afdabac6c7\/download","text":"URN:NBN:fi:jyu-202105182986.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Isokangas, Jyrki Strategic cybersecurity analysis strategic analysis constructive research Tietojärjestelmätiede Information Systems Science 601 päätöksenteko kyberturvallisuus kyberavaruus uhat kansallinen turvallisuus verkkohyökkäykset hybridisota tieto- ja viestintätekniikka decision making cyber security cyberspace threats national security cyber attacks hybrid warfare information and communications technology
title Strategic cybersecurity analysis
title_full Strategic cybersecurity analysis
title_fullStr Strategic cybersecurity analysis Strategic cybersecurity analysis
title_full_unstemmed Strategic cybersecurity analysis Strategic cybersecurity analysis
title_short Strategic cybersecurity analysis
title_sort strategic cybersecurity analysis
title_txtP Strategic cybersecurity analysis
topic strategic analysis constructive research Tietojärjestelmätiede Information Systems Science 601 päätöksenteko kyberturvallisuus kyberavaruus uhat kansallinen turvallisuus verkkohyökkäykset hybridisota tieto- ja viestintätekniikka decision making cyber security cyberspace threats national security cyber attacks hybrid warfare information and communications technology
topic_facet 601 Information Systems Science Tietojärjestelmätiede analysis constructive research cyber attacks cyber security cyberspace decision making hybrid warfare hybridisota information and communications technology kansallinen turvallisuus kyberavaruus kyberturvallisuus national security päätöksenteko strategic threats tieto- ja viestintätekniikka uhat verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/75718 http://www.urn.fi/URN:NBN:fi:jyu-202105182986
work_keys_str_mv AT isokangasjyrki strategiccybersecurityanalysis