fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kari, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Huhta, Rasmus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-06-04T07:45:14Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-06-04T07:45:14Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76232", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkimus suoritettiin dokumenttianalyysill\u00e4, jonka tavoitteena oli saada selville, miten Ven\u00e4j\u00e4n federaatio on suorittanut hy\u00f6kk\u00e4yksellisi\u00e4 kyberoperaatioita vuosina 2007\u20132020 muita valtioita vastaan. Tutkimus suoritettiin, koska aikaisempi tutkimus on j\u00e4tt\u00e4nyt tietoaukon Ven\u00e4j\u00e4n federaation suorittamien hy\u00f6kk\u00e4yksellisten kyberoperaatioiden rakenteen tutkimiselle ja niiden kokoavalle k\u00e4sittelylle. Tutkimus taustoitettiin kirjallisuuskatsauksella hy\u00f6dynt\u00e4en muita alan tutkimuksia. Dokumenttianalyysin aineistona k\u00e4ytettiin tietoturvayhti\u00f6iden, valtiollisten organisaatioiden sek\u00e4 mediatalojen julkaisuja. Tutkimus on tarkoitettu palvelemaan kokonaisturvallisuuden ammattilaisia, jotka ovat kiinnostuneita Ven\u00e4j\u00e4n federaation hy\u00f6kk\u00e4yksellisest\u00e4 kybertoiminnasta. Tutkimuksessa selvitettiin 10 eri operaatiota, jotka ovat Ven\u00e4j\u00e4n federaation suoraan tai v\u00e4lillisesti toteuttamia. N\u00e4m\u00e4 operaatiot toteutettiin Viroa vastaan vuonna 2007, Georgia vastaan vuosina 2008 ja 2019, Kirgisiaa vastaan vuonna 2009, Ukrainaa vastaan vuosina 2015, 2016 ja 2017, Saksaa vastaan vuonna 2015 sek\u00e4 Yhdysvaltoja vastaan vuosina 2015\u20132016 sek\u00e4 vuosina 2019\u20132020. N\u00e4iden lis\u00e4ksi tutkimuksessa selvisi, ett\u00e4 Ven\u00e4j\u00e4n federaatio on hy\u00f6dynt\u00e4nyt kolmea eri tapaa suorittaa hy\u00f6kk\u00e4yksellisi\u00e4 kyberoperaatioita vuosina 2007\u20132020. N\u00e4m\u00e4 kolme tapaa olivat palvelunestohy\u00f6kk\u00e4yksien hy\u00f6dynt\u00e4minen, toimitusketjun hy\u00f6dynt\u00e4minen hy\u00f6kk\u00e4ysvektorina sek\u00e4 kalasteluviestien hy\u00f6dynt\u00e4minen hy\u00f6kk\u00e4ysvektorina. Ven\u00e4j\u00e4n federaation tavassa suorittaa hy\u00f6kk\u00e4yksellisi\u00e4 kyberoperaatioita on tapahtunut selke\u00e4 muutos 2010-luvun alkaessa, sill\u00e4 se alkoi suosia muita kuin palvelunestohy\u00f6kk\u00e4yksi\u00e4 operaatioissaan n\u00e4ihin aikoihin. Tarkan toteutustavan lis\u00e4ksi tutkimuksessa selvisi, ett\u00e4 Ven\u00e4j\u00e4n federaation hy\u00f6kk\u00e4ykselliset kyberoperaatiot noudattavat p\u00e4\u00e4osin samaa perusrakennetta. Tutkimuksen my\u00f6t\u00e4 todettiin, ett\u00e4 Ven\u00e4j\u00e4n federaatio k\u00e4ytt\u00e4\u00e4 hy\u00f6kk\u00e4yksellisi\u00e4 kyberoperaatioita osana valtiollisten tavoitteidensa saavuttamista ja niit\u00e4 on odotettavissa tulevaisuudessakin. Ven\u00e4j\u00e4n federaatiolla on my\u00f6s laaja tietotekninen osaaminen kyberoperaatioiden suorittamiseen ja se kykenee kehitt\u00e4m\u00e4\u00e4n t\u00e4t\u00e4 osaamista jokaisen operaationsa my\u00f6t\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This research was conducted by using document analysis as a method. This research aimed to find out how the Russian Federation has conducted offensive cyber operations against other countries in the years 2007\u20132020. This research was conducted because earlier studies have left a research cap for a study that focuses on the structure of Russian conducted offensive cyber operations and their synthesizing handling. A literature review was used to establish the back-ground of the study by using other studies in the field. The material for the document analysis consisted of publications by information security corporations, media and governmental organizations. This research has been aimed at personnel who work in the field of comprehensive security and who are interested in the offensive cyber actions of the Russian Federation. In this study, 10 different operations conducted by the Russian Federation directly or indirectly were researched. These operations were conducted against Estonia in 2007, against Georgia in 2008 and 2019, against Kyrgyzstan in 2009, against Ukraine in 2015, 2016 and 2017, against Germany in 2015 and against the United States of America in 2015\u20132016 and 2019\u20132020. Also, it was found out during the research that the Russian Federation has used three different ways to conduct its offensive cyber operations in the years 2007\u20132020. These three ways were the use of denial-of-service attacks, the use of supply-chain as an attack vector and the use of phishing emails as an attack vector. There has happened a clear shift in the way the Russian Federation conducts offensive cyber operations around the year 2010 because Russia began to favour other attack types than denial of service attacks in its operations after the year 2010. During the research, it was also found out that the structure of Russia\u2019s offensive cyber operations mainly followed a common structure. As a result of the research, it can be said that the Russian Federation uses offensive cyber operations to achieve its national goals and these operations can be expected to happen in the future. The Russian Federation also has the comprehensive technical expertise to conduct offensive cyber operations and it can develop this expertise after each operation.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-06-04T07:45:14Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-06-04T07:45:14Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "90", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Ven\u00e4j\u00e4n federaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberoperaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyber", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hy\u00f6kk\u00e4yksellinen kyberoperaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "OCO", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ven\u00e4j\u00e4n federaation tavat suorittaa hy\u00f6kk\u00e4yksellisi\u00e4 kyberoperaatioita vuosina 2007\u20132020", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202106043459", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Ven\u00e4j\u00e4", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|