fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Soikkeli, Mikko", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-05-30T16:01:25Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-05-30T16:01:25Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76058", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ty\u00f6n tavoitteena oli selvitt\u00e4\u00e4, miten kansallinen lains\u00e4\u00e4d\u00e4nt\u00f6 velvoittaa ja ohjaa valtionhallinnon viranomaisia tieto- ja kyberturvallisuuden osalta. Alaongelmana vastattiin kysymykseen \"Mit\u00e4 eroa tieto- ja kyberturvallisuudella on lains\u00e4\u00e4d\u00e4nn\u00f6ss\u00e4? Tutkimuksen erityisen\u00e4 mielenkiinnon kohteena oli viranomaisten toimivaltaa ja yhteistoimintaa koskeva s\u00e4\u00e4ntely.\nTutkimus toteutettiin grounded teoria -menetelm\u00e4ll\u00e4 ja tutkimusaineiston muodostivat tieto- ja kyberturvallisuuteen liittyv\u00e4t lait, asetukset, hallituksen esitykset sek\u00e4 relevantit valtioneuvoston periaatep\u00e4\u00e4t\u00f6kset.\nTulosten perusteella lains\u00e4\u00e4d\u00e4nt\u00f6 on kaiken viranomaisen toiminnan perusta. Viranomaisen tieto- ja kyberturvallisuus muodostuu strategisesta ohjauksesta, operatiivisesta kyberturvallisuustoiminnasta ja p\u00e4ivitt\u00e4isist\u00e4 tietoturvallisuustoimenpiteist\u00e4. Kyberturvallisuus eroaa tietoturvallisuudesta siten, ett\u00e4 sit\u00e4 ei k\u00e4sitteen\u00e4 esiinny lains\u00e4\u00e4d\u00e4nn\u00f6ss\u00e4, mutta turvallisuusviranomaiset toteuttavat kuitenkin toimenpiteit\u00e4, joilla pyrit\u00e4\u00e4n varmistamaan yhteiskunnan elint\u00e4rkeiden toimintojen turvaaminen. Kyberturvallisuus edustaa uusiin teknologioihin liittyv\u00e4\u00e4 poikkihallinnollista haastetta, joka ilmenee mm. hallinnonaloille jakautuneina vastuina eik\u00e4 viranomaisten yhteisty\u00f6lle ole selke\u00e4\u00e4 lakipohjaa. \nHallinnon julkisuusperiaate asettaa viranomaisen tietoturvallisuudelle vaatimuksen julkisuusn\u00e4k\u00f6kulmasta k\u00e4ytett\u00e4vyydelle ja salassa pidon osalta luottamuksellisuudelle ja eheydelle. Tutkimuksen perusteella tietoturvallisuuden perustan muodostavia yhten\u00e4isi\u00e4 vaatimuksia ei ole s\u00e4\u00e4detty ja viranomaisten tietoteknisten ratkaisujen arvioinnin s\u00e4\u00e4tely ei edellyt\u00e4 viranomaiselta kansallisen tiedon osalta tietoj\u00e4rjestelmien arviointia. Valtion yhteisten tieto- ja viestint\u00e4teknisten palvelujenkaan osalta ei ole asetettu selkeit\u00e4 vaatimuksia, mik\u00e4 osaltaan j\u00e4tt\u00e4\u00e4 palveluntuottajille merkitt\u00e4v\u00e4n vastuun.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The goal of this thesis was to find out, how national legislation obligates and guides government authorities in information and cyber security. A sub question was \"What is the difference between information and cyber security by legislation?\" Special attention was given to legislation of jurisdiction and cooperation between different authorities. \nThe study was executed according to grounded theory. The research material comprised acts on information and cyber security, government decrees, government proposals and relevant government resolutions.\nAll activities of the public authorities are based on legislation. Authorities' information and cyber security comprises strategic guidance, operational cyber security activities and daily information security measures. Cyber security is not included in legislation as a concept, but still, security authorities execute actions to maintain the vital functions of the society. Cyber security represents emerging technology, which creates a cross governmental challenge by dived responsibilities. Furthermore, legislation gives not enough clear jurisdiction for the cooperation between different authorities.\nPrinciple of public access sets requirements for the information security of the authorities. Public access is related to the availability of the information and on the other hand, secrecy is related to confidentiality and integrity of the information. Based on the results, there are no common criteria for information security requirements by the legislation. No act obligates audit of the infor-mation systems containing only national information. There are also no clear information security requirements for government's common ICT-services, which gives the service provider a remarkable responsibility.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-05-30T16:01:25Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-05-30T16:01:25Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "74", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuuden hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberturvallisuuden hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kokonaisturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Lains\u00e4\u00e4d\u00e4nt\u00f6 tieto- ja kyberturvallisuuden perustana : valtionhallinnon viranomaisen n\u00e4k\u00f6kulma", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202105303303", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "lains\u00e4\u00e4d\u00e4nt\u00f6", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "valtionhallinto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "s\u00e4\u00e4ntely", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hallinto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|