fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kokko, Tuomas", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Toropainen, Minttu", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-12-10T08:24:20Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-12-10T08:24:20Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/78929", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden internet eli IoT (Internet of Things) on kasvanut viime vuosina yh\u00e4 \nlaaja-alaisemmin eri aloilla. IoT-laitteita k\u00e4ytet\u00e4\u00e4n nykyisin niin terveydenhuollossa kuin \u00e4lykaupungeissakin. Kuitenkin my\u00f6s kotioloissa k\u00e4ytett\u00e4v\u00e4t IoT-laitteet ovat lis\u00e4\u00e4ntyneet merkitt\u00e4v\u00e4sti. Verkkoihin kytketyt laitteet ovat tuoneet tavallisten k\u00e4ytt\u00e4jien ulottuville kehittyneit\u00e4, hy\u00f6dyllisi\u00e4 ja \u00e4lykk\u00e4it\u00e4 palveluita. \nKuitenkin yksityisyydensuoja ja IoT-laitteiden haavoittuvuudet ovat nousseet \npinnalle tehdyiss\u00e4 tutkimuksissa. T\u00e4ss\u00e4 tutkielmassa perehdyn tarkemmin tietoturvaongelmiin sek\u00e4 siihen, kuinka n\u00e4ilt\u00e4 ongelmilta tulisi suojautua. Tutkimuksen keskeinen osa-alue on tietoturvaongelmat eri ymp\u00e4rist\u00f6iss\u00e4. T\u00e4ll\u00e4 tarkoitetaan IoT-laitteiden sovelluskerrosten arkkitehtuuria, teknisi\u00e4 haasteita sek\u00e4 \nmuita yleisi\u00e4 riskej\u00e4, joita laitteiden k\u00e4ytt\u00f6\u00f6n liittyy. \nTietoturvaongelmat voivat aiheuttaa vakavia seurauksia k\u00e4ytt\u00e4j\u00e4n yksityisyydensuojan rikkoutumiseen. T\u00e4m\u00e4n vuoksi paneudun t\u00e4ss\u00e4 tutkielmassa lis\u00e4ksi siihen, millaisia suojaustapoja voidaan hy\u00f6dynt\u00e4\u00e4 riskien v\u00e4ltt\u00e4miseksi. \nTutkielma on toteutettu kvalitatiivisena kirjallisuuskatsauksena ja sen t\u00e4rkeimm\u00e4t tukimuskysymykset ovat: \u201dMillaisia tietoturvariskej\u00e4 IoT-laitteet pit\u00e4v\u00e4t sis\u00e4ll\u00e4\u00e4n?\u201d ja \u201dMiten n\u00e4ilt\u00e4 riskeilt\u00e4 tulisi suojautua?\u201d. Tutkiessani erilaisia tietoturvariskej\u00e4 k\u00e4vi ilmi, ett\u00e4 riskit ovat hyvin monitasoisia. Osa riskeist\u00e4 nivoutui selke\u00e4sti k\u00e4ytt\u00e4j\u00e4n huolimattomuuteen tai v\u00e4linpit\u00e4m\u00e4tt\u00f6myyteen. Huomattava osa \ntunnistetuista tietoturvariskeist\u00e4 ja -haavoittuvuuksista liittyi kuitenkin IoT-arkkitehtuurin eri kerroksissa esiintyviin ongelmiin. N\u00e4iden tunnistettujen riskien\ntietoturvahaasteet eiv\u00e4t kuitenkaan olleet ainoa ongelma. Laitteiden turvallisuuden takaamiseksi my\u00f6s laitevalmistajien aktiivisella toiminnalla on suuri merkitys turvallisuuden parantamiseksi. \nTutkielman toisessa p\u00e4\u00e4teemassa eli suojaamisen parantamisessa nousi\nesiin laitevalmistajien vastuu myydyist\u00e4 IoT-laitteista. T\u00e4h\u00e4n ei kuitenkaan yksist\u00e4\u00e4n kannata nojautua, vaan my\u00f6s k\u00e4ytt\u00e4jien tavat ja osaaminen huolehtia laitteidensa suojaamisesta ja tietoturvasta on t\u00e4rke\u00e4ss\u00e4 asemassa tietojen v\u00e4\u00e4rink\u00e4ytt\u00e4misen ehk\u00e4isyss\u00e4. N\u00e4iden kahden suojaamistavan yhdist\u00e4misell\u00e4 on parhaat \nedellytykset laitteiden tietoturvalliseen k\u00e4ytt\u00f6\u00f6n. T\u00e4m\u00e4n tutkimuksen tuloksena\non, ett\u00e4 nykyisell\u00e4\u00e4n olevat IoT-laitteet vaativat parempaa suojaustasoa, vaikka \nresursseja t\u00e4lle ei viel\u00e4 ole. Jatkuvat teknologian muutokset tuovat lis\u00e4haasteita \nniin laitevalmistajille, k\u00e4ytt\u00e4jille kuin lains\u00e4\u00e4d\u00e4nn\u00f6llekin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The Internet of Things (IoT) has grown more widely in various fields in recent \nyears. IoT devices are currently used as in health care and smart cities. However, \nalso IoT devices used at home have seen tremendous growth. Network connected \ndevices have brought advanced, intelligent, and useful services to ordinary users. \nHowever, privacy concerns and vulnerabilities in IoT devices have stand out in \nprevious studies. In this research, I will look more closely at security issues, and \nhow to protect against these problems. A key area of this research is security \nproblems in different environments. This covers the architecture of the application layers, technical challenges and other general challenges associated with the \nuse of the IoT devices. \nSecurity issues may cause serious consequences in violation of user privacy. \nTherefore, in this study I will also look what kind of options can be used to avoid \nthose risks. The research has been implemented as a qualitative literature review \nand its main research questions are: \u201cWhat kind of security risks does IoT involve?\u201d\nand \u201cHow to protect against those risks?\u201d. While I was researching different security \nrisks, it turned out that the risks are a very wide variety. Some of the risks clearly \nlinked to the negligence or indifference of the user. However, a significant part \nof the identified security risks and -vulnerabilities was related to issues with different layers of architecture. The security challenges identified by these were not \nthe only problem. Also, to ensure the safety of devices, the active involvement of \nmanufacturers is one of the most important things how to improve security. \nThe second main theme of the research, which is to improve protection, the \nresponsibility for the devices sold by manufacturer stood out. This is not to be \ntrusted alone, but users\u2019 habits and skills to protect and secure their own devices \nplays an important role in preventing the misuse of their data. Combining these \ntwo methods is the best way to use IoT devices securely. The result of this research is that current IoT devices require a better standard of security, although \nthere are no resources for this. Ongoing technological changes bring additional \nchallenges for device manufacturers, users, and legislation.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-12-10T08:24:20Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-12-10T08:24:20Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Verkkoon kytkettyjen IoT-laitteiden tietoturvaongelmat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202112105918", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "suojaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|