fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kypp\u00f6, Jorma", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Niskanen, Tatu", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-08-26T07:15:29Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-08-26T07:15:29Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/77498", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Massadata, johon viitataan yleisesti my\u00f6s k\u00e4sitteell\u00e4 Big data, on kokoelma dataa, joka on kooltaan todella suuri, se on luonteeltaan monipuolista ja hajanaista, ja sit\u00e4 tulee nopeasti lis\u00e4\u00e4. Massadata aiheuttaa organisaatioille hy\u00f6tyjen ja mahdollisuuksien lis\u00e4ksi my\u00f6s monia tietoturvariskej\u00e4. Digitalisoitumisen mukanaan tuomat ty\u00f6kalut, kuten massadata ja sen useat sovellukset, halutaan usein n\u00e4hd\u00e4 vain taloudellisen kasvun ja tehokkuuden mahdollisuuksien kautta. Niiden todellista kokonaisvaltaisuutta ei aina hahmoteta riitt\u00e4v\u00e4n kattavasti. Siksi t\u00e4ss\u00e4 tutkielmassa tarkastellaan massadatan hy\u00f6dynt\u00e4mist\u00e4 organisaatioissa sen aiheuttamien tietoturvariskien n\u00e4k\u00f6kulmasta. Ensin tutkielmassa selvennet\u00e4\u00e4n, miten eri organisaatioissa ker\u00e4t\u00e4\u00e4n, k\u00e4sitell\u00e4\u00e4n ja hy\u00f6dynnet\u00e4\u00e4n massadataa, ja mihin sit\u00e4 soveltamalla tyypillisesti pyrit\u00e4\u00e4n. Massadatan hy\u00f6dynt\u00e4misess\u00e4 on kyse massiivisen raakadatam\u00e4\u00e4r\u00e4n ker\u00e4\u00e4misest\u00e4, jota s\u00e4il\u00f6t\u00e4\u00e4n tyypillisesti usealla eri palvelimella tai muulla tallennusmedialla. T\u00e4st\u00e4 raakadatasta pyrit\u00e4\u00e4n jalostamaan hy\u00f6dyllist\u00e4 informaatiota data-analytiikan menetelmill\u00e4. \n\nT\u00e4m\u00e4n j\u00e4lkeen tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi, millaisia tietoturvariskej\u00e4 massadatan hy\u00f6dynt\u00e4misest\u00e4 aiheutuu. Massadata aiheuttaa tietoturvariskej\u00e4 erityisesti GDPR-aikana korostuneen henkil\u00f6tietosuojan n\u00e4k\u00f6kulmasta, mutta siihen liittyy my\u00f6s muita v\u00e4hemm\u00e4n itsest\u00e4\u00e4n selvi\u00e4 tietoturvahaasteita. N\u00e4m\u00e4 liittyv\u00e4t esimerkiksi massadatan varastointiin, haitallisen toiminnan tunnistamiseen suurien datamassojen seasta, sek\u00e4 salausalgoritmien suorituskykyyn. Tutkielmassa tarkastellaan my\u00f6s tiiviisti, miten organisaatioissa voidaan hallita joitakin keskeisimmist\u00e4 massadatan tietoturvariskeist\u00e4. Tutkielma on toteutettu kokonaan kirjallisuuskatsauksena.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Big data is a set of data that is large in size, diverse by nature, and rapidly increasing. In addition to the benefits, big data causes notable information security risks to organizations. The tools brought by digitalization are often seen only trough their benefits and their security issues are not fully taken into concern. This dissertation examines the utilization of big data and the related information security risks and problems it arises for organizations. First, it is clarified to the reader how big data is collected, processed, and utilized in different organizations, and for what purpose. This is followed by a review of the information security risks involved. After that we will have a look at how organizations can manage some of these risks. Finally, the summary provides an assessment and conclusion about the usage of big data, and the related information security challenges. We also summarize briefly what organizations should consider when leveraging big data in their operations. The dissertation is carried out as a literature review.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-08-26T07:15:29Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-08-26T07:15:29Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "33", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "datanhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvariskit", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "GDPR", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Massadatan hy\u00f6dynt\u00e4minen tietoturvallisuuden n\u00e4k\u00f6kulmasta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202108264661", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietovuodot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "big data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "informaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|