fullrecord |
[{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Tarvainen, Tapani", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Nurminen, Ilona", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-06-17T06:43:30Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-06-17T06:43:30Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76625", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Laajan teknisen kyberturvallisuusharjoituksen j\u00e4rjest\u00e4minen vaatii runsaasti asiantuntijoiden aikaa ja resursseja. On siis syyt\u00e4 selvitt\u00e4\u00e4, mill\u00e4 tavoin t\u00e4llaisen harjoituksen toteuttaminen voitaisiin saada yksinkertaisemmaksi, edullisemmaksi ja joustavammaksi. T\u00e4m\u00e4n tutkielman tavoitteena on selvitt\u00e4\u00e4, voidaanko Jyv\u00e4skyl\u00e4n yliopistolla j\u00e4rjestett\u00e4v\u00e4 Kyberhy\u00f6kk\u00e4ys ja sen torjunta -kurssi (ITKST55) eli pienimuotoinen kyberturvallisuusharjoitus j\u00e4rjest\u00e4\u00e4 virtualisoidulla palvelinj\u00e4rjestelm\u00e4ll\u00e4. Erityisen kiinnostuneita ollaan mahdollisuudesta virtualisoida suuri osa harjoituksessa k\u00e4ytett\u00e4v\u00e4st\u00e4 infrastruktuurista yhden laitekokonaisuuden sis\u00e4\u00e4n, ns. hyperkonvergoidusta infrastruktuurista. Tutkielma k\u00e4y l\u00e4pi virtualisointiin ja kyberturvallisuusharjoituksiin liittyv\u00e4n olennaisen k\u00e4sitteist\u00f6n ja tarkastelee kyberturvallisuuden opetusk\u00e4yt\u00f6n arkkitehtuuri- ja infrastruktuurivalintoja konstruktiivisen tutkimuksen keinoin. Tutkimuksen empiirisess\u00e4 osuudessa m\u00e4\u00e4ritell\u00e4\u00e4n kurssin tavoitteiden mukaiset vaatimukset virtuaalipalvelinj\u00e4rjestelm\u00e4lle ja toteutetaan konstruktiivisen tutkimusmenetelm\u00e4n mukainen artefakti eli prototyyppi virtuaalipalvelinj\u00e4rjestelm\u00e4st\u00e4 k\u00e4ytett\u00e4v\u00e4ksi vuoden 2019 ITKST55-kurssilla. Prototyyppi rakennetaan Proxmox Virtual Environment-k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4jakelun avulla, ja asetettujen vaatimuksien toteutuminen arvioidaan vuoden 2019 kurssitoteuman valossa. Tutkimuksessa havaitaan, ett\u00e4 virtuaalipalvelinj\u00e4rjestelm\u00e4 soveltuu kyberturvallisuusharjoituksen j\u00e4rjest\u00e4miseen prototyypin perusteella. Lis\u00e4ksi saadaan tietoa Proxmox VE-k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4jakelun ja hyperkonvergoidun infrastruktuurin periaatteiden soveltuvuudesta kyberturvallisuusharjoituksen j\u00e4rjest\u00e4miseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Organizing a technical cyber security exercise requires a tremendous amount of subject-matter expert time and resources. Attempting to streamline this process into a less\ncomplex and expensive form is thus worth the effort. This thesis aims to determine whether the \u201cNetwork attack and its countermeasures\u201d (ITKST55) course, a small-scale cyber security exercise in itself, is feasible to implement using a virtualized platform. Of particular interest is virtualizing as much of the required infrastructure into a single managed device in\nthe manner of hyper-converged infrastructure. Key concepts related to virtualization and cyber security exercises are explored by the means of design science. In the empirical chapter\nrequirements for the virtualized platform are determined from the goals of the course. These requirements are then implemented into the design science artefact, a prototype of a full-\nscale cyber exercise virtualization platform. This platform is then evaluated in use during the 2019 iteration of ITKST55. The prototype is built with tools available in the Proxmox Virtual Environment virtualization software distribution. The research carried out in the thesis posits that a virtualized platform is suf\ufb01cient for implementing a cyber security exercise as proven by the prototype. Additionally, the thesis provides data on the application of Proxmox VE and hyperconverged infrastructure concepts in cybersecurity exercises.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-06-17T06:43:30Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-06-17T06:43:30Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "82", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberharjoitus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Proxmox", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Proxmox-virtuaalipalvelinymp\u00e4rist\u00f6 Jyv\u00e4skyl\u00e4n yliopiston kyberturvallisuuden kursseja varten", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202106173823", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "virtualisointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|