fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kypp\u00f6, Jorma", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kyr\u00f6l\u00e4, Alina", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-09-16T05:52:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-09-16T05:52:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/77805", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Internet of Things, eli esineiden internet, on viime vuosina yleistynyt teknologia,\njoka on tarjonnut helpotusta ja mukavuutta niin julkiselle sektorille, kuin yksityishenkil\u00f6ille. Yksi yksityishenkil\u00f6iden k\u00e4ytt\u00f6ymp\u00e4rist\u00f6ist\u00e4 esineiden internetille on sen teknologiaa hy\u00f6dynt\u00e4v\u00e4 \u00e4lykoti. K\u00e4ytt\u00e4j\u00e4 voi hallita IoT-\u00e4lykodin\nlaitteita helposti et\u00e4\u00e4lt\u00e4 k\u00e4sin, esimerkiksi matkapuhelimensa avulla. Kokonaisuudessaan \u00e4lykoti voi helpottaa k\u00e4ytt\u00e4j\u00e4ns\u00e4 arkea s\u00e4\u00e4st\u00e4en aikaa ja rahaa. Ongelmaksi muodostuu kuitenkin se, ett\u00e4 \u00e4lykotiymp\u00e4rist\u00f6ss\u00e4 IoT-j\u00e4rjestelm\u00e4\u00e4\nhallitsevalla henkil\u00f6ll\u00e4 harvoin on tietotaitoa ja resursseja yll\u00e4pit\u00e4\u00e4 asianmukaista kyberturvallisuutta, mik\u00e4 nostaa kyberturvahaavoittuvuuksien m\u00e4\u00e4r\u00e4\u00e4,\nja kasvattaa kyberturvariskien toteutumisen todenn\u00e4k\u00f6isyytt\u00e4.\n\u00c4lykotien IoT-laitteiden turvallisuus on aiheena t\u00e4rke\u00e4, sill\u00e4 pahimmassa\ntapauksessa turvaton ja ep\u00e4varma j\u00e4rjestelm\u00e4 voi aiheuttaa jopa hengenvaarallisia tilanteita. IoT-laitteiden turvallisuus on yleisell\u00e4 tasolla kehittym\u00e4ss\u00e4 jatkuvasti, mutta kokonaisuudessaan ne ovat viel\u00e4 t\u00e4ynn\u00e4 haavoittuvuuksia. Voidaan my\u00f6s olettaa, ett\u00e4 IoT-laitteet ovat hy\u00f6kk\u00e4\u00e4jien kohteena viel\u00e4 vuosien\najan (Noor & Hassan, 2018). T\u00e4ss\u00e4 kandidaatintutkielmassa tarkastellaan IoTlaitteiden kyberturvahaavoittuvuuksia \u00e4lykotiymp\u00e4rist\u00f6ss\u00e4, sek\u00e4 k\u00e4sitell\u00e4\u00e4n\nniist\u00e4 johtuvia riskej\u00e4 k\u00e4ytt\u00e4en pohjana tutkimuskysymyksi\u00e4 \u201dMitk\u00e4 ovat IoT\u00e4lykodin keskeisimm\u00e4t kyberturvahaavoittuvuudet?\u201d ja \u201dMit\u00e4 kyberturvariskej\u00e4 IoT\u00e4lykodin kyberturvahaavoittuvuuksista voi seurata?\u201d Tutkielma on toteutettu kirjallisuuskatsauksena. Tutkielman tuloksena syntyi taulukko, jossa m\u00e4\u00e4ritell\u00e4\u00e4n\nkeskeisimm\u00e4t IoT-\u00e4lykotien haavoittuvuudet, sek\u00e4 niihin liittyvi\u00e4 riskej\u00e4. Tutkielman tuloksista voidaan todeta, ett\u00e4 \u00e4lykodin IoT-laitteiden haavoittuvuuksia on paljon ja ne voivat altistaa vakavillekin riskeille. Osan n\u00e4ist\u00e4 haavoittuvuuksista voi kitke\u00e4 yksinkertaisillakin menetelmill\u00e4, mutta usein jo yksinkertaisiinkin suojauskeinoihin vaaditaan resursseja, joita ei t\u00e4ll\u00e4 hetkell\u00e4 ole.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Internet of Things (IoT) is a technology that has become popular in the last\nyears and has provided convenience for both public sector and private persons.\nOne of the use environments of IoT for a private person is a modern smart\nhome. The user can effortlessly control the devices of their IoT smart home with,\nfor example, their smart phone. Overall a smart home can make the life of its\nuser easier by saving time and money. The problems form when the person\ncontrolling the IoT system in a smart home environment does not have the\nproper knowledge or resources to maintain adequate security, which increases\nthe amount of cyber security vulnerabilities and makes cyber security risks\nmore likely to happen.\nThe security of IoT-devices in smart homes is a relevant topic because in\nthe worst-case insecure systems can even lead to life-threatening situations. The\nsecurity of IoT is constantly developing, but overall, they are still full of vulnerabilities. This Bachelor\u2019s thesis focuses on the cyber security vulnerabilities of\nIoT devices in smart homes and covers the risks that result from those vulnerabilities. The research is based on two research questions:\u201d What are the crucial\ncyber security vulnerabilities in an IoT-smart home?\u201d and \u201cWhat cyber security risks\nresult from the vulnerabilities of IoT-smart homes?\u201d. This study has been carried out\nas a literature review. As the result of this study was created a table that defines\nthe main cyber security vulnerabilities of IoT-smart homes and the risks that\nresult from those. The results of this study show that smart home IoT-devices\nhave plenty of vulnerabilities which can lead to serious risks. However, there\nare easy solutions to prevent and fix the vulnerabilities, although the resources\nneeded do not exist.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-09-16T05:52:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-09-16T05:52:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "IOT-laitteiden kyberturvahaavoittuvuudet \u00e4lykotiymp\u00e4rist\u00f6ss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202109164881", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lytalot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4tiede", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|