Ohjelmistorobotiikan tietoturvan hallinta

Ohjelmistorobotiikka on teknologia, joka soveltuu rutiininomaisten työtehtävien automatisoimiseen. Tämän tutkielman tarkoituksena oli tutustua ohjelmistorobotiikan ominaispiirteisiin, sekä syventyä tarkastelemaan ohjelmistorobotiikan tietoturvaa ja sen hallintaan. Tavoitteena oli kartoittaa ohjelmis...

Full description

Bibliographic Details
Main Author: Lankia, Otto
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:fin
Published: 2021
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/79139
_version_ 1826225754920189952
author Lankia, Otto
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Lankia, Otto Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Lankia, Otto Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Lankia, Otto
datasource_str_mv jyx
description Ohjelmistorobotiikka on teknologia, joka soveltuu rutiininomaisten työtehtävien automatisoimiseen. Tämän tutkielman tarkoituksena oli tutustua ohjelmistorobotiikan ominaispiirteisiin, sekä syventyä tarkastelemaan ohjelmistorobotiikan tietoturvaa ja sen hallintaan. Tavoitteena oli kartoittaa ohjelmistorobotiikkaan kohdistuvia tietoturvahaasteita sekä löytää keinoja näihin haasteisiin vastaamiseksi. Tutkimus koostuu kirjallisuuskatsauksesta sekä empiirisestä osiosta, joka toteutettiin yksittäisenä tapaustutkimuksena. Tutkimusmateriaali kerättiin teemahaastattelujen avulla, jonka analysointiin sovellettiin teorialähtöisen sisällönanalyysin menetelmää. Tutkimus osoitti, että identiteetin- ja pääsynhallinnan kokonaisuus on merkittävin tekijä ohjelmistorobotiikan tietoturvan hallinnan kannalta. Keskeisimmät löydökset liittyivät ohjelmistorobotin digitaalisen identiteetin elinkaareen ja sen hallintaan, salasanakäytäntöihin, tunnistautumismenetelmiin sekä ohjelmistorobotin käyttöoikeuksiin kohdejärjestelmien sisällä. Muita ohjelmistorobotiikan tietoturvanhallintaan keskeisesti liittyviä teemoja olivat datan eheys, informaatioteknologian kuluttajistuminen sekä tietosuoja. Tutkimus osoitti, että keskeisiä keinoja ohjelmistorobotiikan tietoturvan varmistamiseksi ovat organisaation tietoturvapolitiikan ja muiden tietoturvamallien ja -rakenteiden noudattaminen ja soveltaminen, eri sidosryhmien osallistaminen sekä tietoisuuden lisääminen organisaation sisällä. Robotic process automation is a technology that is suitable for automating routine work tasks. The purpose of this study was to explore the characteristics of robotic process automation and focus on its information security and security management. The aim was to detect the security challenges of robotic process automation and to find ways to meet these challenges. This study consists of a literature review and an empirical section, which was conducted as a single case study. The research material was collected through thematic interviews, which were analyzed using the method of theory-based content analysis. The study showed that the area of identity and access management is the most significant factor in the security management of the robotic process automation. The main findings were related to the life cycle and management of software robot’s digital identity, password policies, authentication methods, and software robot access rights within the target systems. Other important themes related to information security management in robotic process automation were data integrity, the consumerization of information technology, and data privacy. The study showed that applying the organization’s security policy and other information security models is the main way to ensure the security of robotic process automation. Also, involvement of various stakeholders and increasing awareness within the organization are required to ensure proper information security management of robotic process automation.
first_indexed 2021-12-22T21:03:36Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "J\u00e4rvinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lankia, Otto", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-12-22T10:53:07Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-12-22T10:53:07Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/79139", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ohjelmistorobotiikka on teknologia, joka soveltuu rutiininomaisten ty\u00f6teht\u00e4vien automatisoimiseen. T\u00e4m\u00e4n tutkielman tarkoituksena oli tutustua ohjelmistorobotiikan ominaispiirteisiin, sek\u00e4 syventy\u00e4 tarkastelemaan ohjelmistorobotiikan tietoturvaa ja sen hallintaan. Tavoitteena oli kartoittaa ohjelmistorobotiikkaan kohdistuvia tietoturvahaasteita sek\u00e4 l\u00f6yt\u00e4\u00e4 keinoja n\u00e4ihin haasteisiin vastaamiseksi. Tutkimus koostuu kirjallisuuskatsauksesta sek\u00e4 empiirisest\u00e4 osiosta, joka toteutettiin yksitt\u00e4isen\u00e4 tapaustutkimuksena. Tutkimusmateriaali ker\u00e4ttiin teemahaastattelujen avulla, jonka analysointiin sovellettiin teorial\u00e4ht\u00f6isen sis\u00e4ll\u00f6nanalyysin menetelm\u00e4\u00e4. Tutkimus osoitti, ett\u00e4 identiteetin- ja p\u00e4\u00e4synhallinnan kokonaisuus on merkitt\u00e4vin tekij\u00e4 ohjelmistorobotiikan tietoturvan hallinnan kannalta. Keskeisimm\u00e4t l\u00f6yd\u00f6kset liittyiv\u00e4t ohjelmistorobotin digitaalisen identiteetin elinkaareen ja sen hallintaan, salasanak\u00e4yt\u00e4nt\u00f6ihin, tunnistautumismenetelmiin sek\u00e4 ohjelmistorobotin k\u00e4ytt\u00f6oikeuksiin kohdej\u00e4rjestelmien sis\u00e4ll\u00e4. Muita ohjelmistorobotiikan tietoturvanhallintaan keskeisesti liittyvi\u00e4 teemoja olivat datan eheys, informaatioteknologian kuluttajistuminen sek\u00e4 tietosuoja. Tutkimus osoitti, ett\u00e4 keskeisi\u00e4 keinoja ohjelmistorobotiikan tietoturvan varmistamiseksi ovat organisaation tietoturvapolitiikan ja muiden tietoturvamallien ja -rakenteiden noudattaminen ja soveltaminen, eri sidosryhmien osallistaminen sek\u00e4 tietoisuuden lis\u00e4\u00e4minen organisaation sis\u00e4ll\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Robotic process automation is a technology that is suitable for automating routine work tasks. The purpose of this study was to explore the characteristics of robotic process automation and focus on its information security and security management. The aim was to detect the security challenges of robotic process automation and to find ways to meet these challenges. This study consists of a literature review and an empirical section, which was conducted as a single case study. The research material was collected through thematic interviews, which were analyzed using the method of theory-based content analysis. The study showed that the area of identity and access management is the most significant factor in the security management of the robotic process automation. The main findings were related to the life cycle and management of software robot\u2019s digital identity, password policies, authentication methods, and software robot access rights within the target systems. Other important themes related to information security management in robotic process automation were data integrity, the consumerization of information technology, and data privacy. The study showed that applying the organization\u2019s security policy and other information security models is the main way to ensure the security of robotic process automation. Also, involvement of various stakeholders and increasing awareness within the organization are required to ensure proper information security management of robotic process automation.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2021-12-22T10:53:07Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-12-22T10:53:07Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "66", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmistorobotiikka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identiteetin- ja p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "datan eheys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatioteknologian kuluttajistuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ohjelmistorobotiikan tietoturvan hallinta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202112226121", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "8490", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "robotiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_79139
language fin
last_indexed 2025-02-18T10:55:36Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/f280d34f-3d13-44a2-bcc2-5fa93e35ebab\/download","text":"URN:NBN:fi:jyu-202112226121.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Lankia, Otto Ohjelmistorobotiikan tietoturvan hallinta ohjelmistorobotiikka identiteetin- ja pääsynhallinta datan eheys informaatioteknologian kuluttajistuminen Tietojärjestelmätiede Information Systems Science 601 tietosuoja tietoturva robotiikka
title Ohjelmistorobotiikan tietoturvan hallinta
title_full Ohjelmistorobotiikan tietoturvan hallinta
title_fullStr Ohjelmistorobotiikan tietoturvan hallinta Ohjelmistorobotiikan tietoturvan hallinta
title_full_unstemmed Ohjelmistorobotiikan tietoturvan hallinta Ohjelmistorobotiikan tietoturvan hallinta
title_short Ohjelmistorobotiikan tietoturvan hallinta
title_sort ohjelmistorobotiikan tietoturvan hallinta
title_txtP Ohjelmistorobotiikan tietoturvan hallinta
topic ohjelmistorobotiikka identiteetin- ja pääsynhallinta datan eheys informaatioteknologian kuluttajistuminen Tietojärjestelmätiede Information Systems Science 601 tietosuoja tietoturva robotiikka
topic_facet 601 Information Systems Science Tietojärjestelmätiede datan eheys identiteetin- ja pääsynhallinta informaatioteknologian kuluttajistuminen ohjelmistorobotiikka robotiikka tietosuoja tietoturva
url https://jyx.jyu.fi/handle/123456789/79139 http://www.urn.fi/URN:NBN:fi:jyu-202112226121
work_keys_str_mv AT lankiaotto ohjelmistorobotiikantietoturvanhallinta