fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Niemel\u00e4, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jolkkonen, Tomi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-02-02T10:54:28Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-02-02T10:54:28Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/79613", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietojen ja datan suojaaminen on kriittinen toimenpide, olitpa sitten yksityishenkil\u00f6 tallentamassa kuvia ja ajamassa \u00e4lyk\u00e4st\u00e4 autoa tai yritys tekem\u00e4ss\u00e4 varmuuskopioita ja k\u00e4ytt\u00e4m\u00e4ss\u00e4 pilvilaskentaa. T\u00e4n\u00e4 p\u00e4iv\u00e4n\u00e4 l\u00e4hes kaikki laitteet ja palvelut ker\u00e4\u00e4v\u00e4t, k\u00e4ytt\u00e4v\u00e4t sek\u00e4 l\u00e4hett\u00e4v\u00e4t tietoa tallentaen sit\u00e4 useisiin eri kohteisiin. Koska dataa on paljon ja sit\u00e4 pit\u00e4\u00e4 k\u00e4sitell\u00e4 monin eri tavoin, ratkaisuna on usein k\u00e4ytt\u00e4\u00e4 erilaisia pilvipalvelujen tarjoajia. \n\nOngelmaksi syntyy, ett\u00e4 aina ei tiedet\u00e4 miss\u00e4 oma data sijaitsee tai mit\u00e4 keinoja sen turvaamiseksi k\u00e4ytet\u00e4\u00e4n. Esineiden internet on jatkuvasti laajeneva laitteiden maailma, joka yhdist\u00e4\u00e4 l\u00e4hes kaikki maailman koneet yhdeksai j\u00e4ttiverkoksi ker\u00e4ten ja k\u00e4ytt\u00e4en niiden synnytt\u00e4m\u00e4\u00e4 dataa useissa eri kohteissa, joiden sijainti on h\u00e4m\u00e4r\u00e4n peitossa. Useat eri palvelut my\u00f6s puhelimissa perustuvat datan k\u00e4sittelemiseen sek\u00e4 sensoreiden yhteistoimintaan. Tietoturvan kannalta on siis syyt\u00e4 pohtia, tied\u00e4mmek\u00f6 mit\u00e4 tietoja meill\u00e4 on, miss\u00e4 ne sijaitsevat ja kuinka ne turvataan. \n\nT\u00e4rkein ratkaisu ja aloituspiste tiedon turvaamiseen on tunnistaa pilviresurssit, joita kaikki laitteet, palvelut ja operaattorit k\u00e4ytt\u00e4v\u00e4t. T\u00e4m\u00e4 opinn\u00e4ytety\u00f6 esittelee pilviresurssientunnistamisstrategian, jonka avulla voidaan identifioidaan henkil\u00f6n tai yrityksen kaikki domainit ja niihin liittyv\u00e4t IP-osoitteet ja t\u00e4t\u00e4 kautta tiedon sijainnit, jotta niiden suojaamiseksi voidaan tehd\u00e4 jatkotoimenpiteit\u00e4. Pilviomaisuuden tunnistus voidaan tehd\u00e4 internetl\u00e4hteiden sek\u00e4 avoimen l\u00e4hdekoodin sovellusten avulla. T\u00e4ll\u00e4 strategialla organisaatio voi suojautua paremmin pilvipalvelujen haavoittuvuuksilta. Kaikki l\u00e4htee IP-osoitteiden ja pilvipalveluiden tunnistamisesta, koska jos ei tiedet\u00e4 mit\u00e4 omaisuutta meill\u00e4 on, sit\u00e4 ei voida suojella.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Securing information is a critical issue, whether you are a private citizen taking pictures and videos, a business owner making backups and using cloud computing, driving a smart car, or using a smart home. Information is collected, used and modified and is ubiquitous. Very often, the solution is to use some sort of cloud service provider. \n\nThe common problem, however, is to identify where your data is, and what cybersecurity means are used to keep it safe. The Internet of Things is an ever-expanding world of devices connecting nearly every machine of the world and collecting data from machines and sensors for the cloud. Every business in the world collects and uses data, and servers are often rented from outside the company\u2019s own walls. A private person gathers and uses information every day with a phone or computer using multiple services. The fair question is: Do we know what data we have, where it is and how it stays secure? \n\nThe key concern is to identify cloud assets that are used by any operator, private or public. \n\nThis thesis presents a cloud asset identification strategy that can be used to fully identify all your assets throughout the supply chain and protect your data. With internet resources and a few open-source tools it is easy to identify organisations\u2019 all domains, IP addresses and which ones belong to cloud service providers. With these steps, an organisation can protect itself better from the ulnerabilities of cloud services. Without knowing what assets you have, it is impossible to protect them.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-02-02T10:54:28Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-02-02T10:54:28Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "63", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Cloud", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IP identification", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Asset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Dark Web", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Vulnerabilities", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Cloud Asset Identification Strategy", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202202021373", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pilvipalvelut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet of things", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cloud services", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data protection", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|