Cloud Asset Identification Strategy

Tietojen ja datan suojaaminen on kriittinen toimenpide, olitpa sitten yksityishenkilö tallentamassa kuvia ja ajamassa älykästä autoa tai yritys tekemässä varmuuskopioita ja käyttämässä pilvilaskentaa. Tänä päivänä lähes kaikki laitteet ja palvelut keräävät, käyttävät sekä lähettävät tietoa tallentae...

Full description

Bibliographic Details
Main Author: Jolkkonen, Tomi
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/79613
_version_ 1828193046001352704
author Jolkkonen, Tomi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Jolkkonen, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Jolkkonen, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Jolkkonen, Tomi
datasource_str_mv jyx
description Tietojen ja datan suojaaminen on kriittinen toimenpide, olitpa sitten yksityishenkilö tallentamassa kuvia ja ajamassa älykästä autoa tai yritys tekemässä varmuuskopioita ja käyttämässä pilvilaskentaa. Tänä päivänä lähes kaikki laitteet ja palvelut keräävät, käyttävät sekä lähettävät tietoa tallentaen sitä useisiin eri kohteisiin. Koska dataa on paljon ja sitä pitää käsitellä monin eri tavoin, ratkaisuna on usein käyttää erilaisia pilvipalvelujen tarjoajia. Ongelmaksi syntyy, että aina ei tiedetä missä oma data sijaitsee tai mitä keinoja sen turvaamiseksi käytetään. Esineiden internet on jatkuvasti laajeneva laitteiden maailma, joka yhdistää lähes kaikki maailman koneet yhdeksai jättiverkoksi keräten ja käyttäen niiden synnyttämää dataa useissa eri kohteissa, joiden sijainti on hämärän peitossa. Useat eri palvelut myös puhelimissa perustuvat datan käsittelemiseen sekä sensoreiden yhteistoimintaan. Tietoturvan kannalta on siis syytä pohtia, tiedämmekö mitä tietoja meillä on, missä ne sijaitsevat ja kuinka ne turvataan. Tärkein ratkaisu ja aloituspiste tiedon turvaamiseen on tunnistaa pilviresurssit, joita kaikki laitteet, palvelut ja operaattorit käyttävät. Tämä opinnäytetyö esittelee pilviresurssientunnistamisstrategian, jonka avulla voidaan identifioidaan henkilön tai yrityksen kaikki domainit ja niihin liittyvät IP-osoitteet ja tätä kautta tiedon sijainnit, jotta niiden suojaamiseksi voidaan tehdä jatkotoimenpiteitä. Pilviomaisuuden tunnistus voidaan tehdä internetlähteiden sekä avoimen lähdekoodin sovellusten avulla. Tällä strategialla organisaatio voi suojautua paremmin pilvipalvelujen haavoittuvuuksilta. Kaikki lähtee IP-osoitteiden ja pilvipalveluiden tunnistamisesta, koska jos ei tiedetä mitä omaisuutta meillä on, sitä ei voida suojella. Securing information is a critical issue, whether you are a private citizen taking pictures and videos, a business owner making backups and using cloud computing, driving a smart car, or using a smart home. Information is collected, used and modified and is ubiquitous. Very often, the solution is to use some sort of cloud service provider. The common problem, however, is to identify where your data is, and what cybersecurity means are used to keep it safe. The Internet of Things is an ever-expanding world of devices connecting nearly every machine of the world and collecting data from machines and sensors for the cloud. Every business in the world collects and uses data, and servers are often rented from outside the company’s own walls. A private person gathers and uses information every day with a phone or computer using multiple services. The fair question is: Do we know what data we have, where it is and how it stays secure? The key concern is to identify cloud assets that are used by any operator, private or public. This thesis presents a cloud asset identification strategy that can be used to fully identify all your assets throughout the supply chain and protect your data. With internet resources and a few open-source tools it is easy to identify organisations’ all domains, IP addresses and which ones belong to cloud service providers. With these steps, an organisation can protect itself better from the ulnerabilities of cloud services. Without knowing what assets you have, it is impossible to protect them.
first_indexed 2022-02-02T21:03:36Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Niemel\u00e4, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jolkkonen, Tomi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-02-02T10:54:28Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-02-02T10:54:28Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/79613", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietojen ja datan suojaaminen on kriittinen toimenpide, olitpa sitten yksityishenkil\u00f6 tallentamassa kuvia ja ajamassa \u00e4lyk\u00e4st\u00e4 autoa tai yritys tekem\u00e4ss\u00e4 varmuuskopioita ja k\u00e4ytt\u00e4m\u00e4ss\u00e4 pilvilaskentaa. T\u00e4n\u00e4 p\u00e4iv\u00e4n\u00e4 l\u00e4hes kaikki laitteet ja palvelut ker\u00e4\u00e4v\u00e4t, k\u00e4ytt\u00e4v\u00e4t sek\u00e4 l\u00e4hett\u00e4v\u00e4t tietoa tallentaen sit\u00e4 useisiin eri kohteisiin. Koska dataa on paljon ja sit\u00e4 pit\u00e4\u00e4 k\u00e4sitell\u00e4 monin eri tavoin, ratkaisuna on usein k\u00e4ytt\u00e4\u00e4 erilaisia pilvipalvelujen tarjoajia. \n\nOngelmaksi syntyy, ett\u00e4 aina ei tiedet\u00e4 miss\u00e4 oma data sijaitsee tai mit\u00e4 keinoja sen turvaamiseksi k\u00e4ytet\u00e4\u00e4n. Esineiden internet on jatkuvasti laajeneva laitteiden maailma, joka yhdist\u00e4\u00e4 l\u00e4hes kaikki maailman koneet yhdeksai j\u00e4ttiverkoksi ker\u00e4ten ja k\u00e4ytt\u00e4en niiden synnytt\u00e4m\u00e4\u00e4 dataa useissa eri kohteissa, joiden sijainti on h\u00e4m\u00e4r\u00e4n peitossa. Useat eri palvelut my\u00f6s puhelimissa perustuvat datan k\u00e4sittelemiseen sek\u00e4 sensoreiden yhteistoimintaan. Tietoturvan kannalta on siis syyt\u00e4 pohtia, tied\u00e4mmek\u00f6 mit\u00e4 tietoja meill\u00e4 on, miss\u00e4 ne sijaitsevat ja kuinka ne turvataan. \n\nT\u00e4rkein ratkaisu ja aloituspiste tiedon turvaamiseen on tunnistaa pilviresurssit, joita kaikki laitteet, palvelut ja operaattorit k\u00e4ytt\u00e4v\u00e4t. T\u00e4m\u00e4 opinn\u00e4ytety\u00f6 esittelee pilviresurssientunnistamisstrategian, jonka avulla voidaan identifioidaan henkil\u00f6n tai yrityksen kaikki domainit ja niihin liittyv\u00e4t IP-osoitteet ja t\u00e4t\u00e4 kautta tiedon sijainnit, jotta niiden suojaamiseksi voidaan tehd\u00e4 jatkotoimenpiteit\u00e4. Pilviomaisuuden tunnistus voidaan tehd\u00e4 internetl\u00e4hteiden sek\u00e4 avoimen l\u00e4hdekoodin sovellusten avulla. T\u00e4ll\u00e4 strategialla organisaatio voi suojautua paremmin pilvipalvelujen haavoittuvuuksilta. Kaikki l\u00e4htee IP-osoitteiden ja pilvipalveluiden tunnistamisesta, koska jos ei tiedet\u00e4 mit\u00e4 omaisuutta meill\u00e4 on, sit\u00e4 ei voida suojella.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Securing information is a critical issue, whether you are a private citizen taking pictures and videos, a business owner making backups and using cloud computing, driving a smart car, or using a smart home. Information is collected, used and modified and is ubiquitous. Very often, the solution is to use some sort of cloud service provider. \n\nThe common problem, however, is to identify where your data is, and what cybersecurity means are used to keep it safe. The Internet of Things is an ever-expanding world of devices connecting nearly every machine of the world and collecting data from machines and sensors for the cloud. Every business in the world collects and uses data, and servers are often rented from outside the company\u2019s own walls. A private person gathers and uses information every day with a phone or computer using multiple services. The fair question is: Do we know what data we have, where it is and how it stays secure? \n\nThe key concern is to identify cloud assets that are used by any operator, private or public. \n\nThis thesis presents a cloud asset identification strategy that can be used to fully identify all your assets throughout the supply chain and protect your data. With internet resources and a few open-source tools it is easy to identify organisations\u2019 all domains, IP addresses and which ones belong to cloud service providers. With these steps, an organisation can protect itself better from the ulnerabilities of cloud services. Without knowing what assets you have, it is impossible to protect them.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-02-02T10:54:28Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-02-02T10:54:28Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "63", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Cloud", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IP identification", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Asset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Dark Web", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Vulnerabilities", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Cloud Asset Identification Strategy", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202202021373", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pilvipalvelut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet of things", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cloud services", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data protection", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_79613
language eng
last_indexed 2025-03-31T20:02:33Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/a63833d3-c76c-4aa4-856e-1b8b72d50efa\/download","text":"URN:NBN:fi:jyu-202202021373.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Jolkkonen, Tomi Cloud Asset Identification Strategy Cloud IP identification Asset Dark Web Vulnerabilities Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus esineiden internet pilvipalvelut tietoturva tietosuoja cyber security Internet of things cloud services data security data protection
title Cloud Asset Identification Strategy
title_full Cloud Asset Identification Strategy
title_fullStr Cloud Asset Identification Strategy Cloud Asset Identification Strategy
title_full_unstemmed Cloud Asset Identification Strategy Cloud Asset Identification Strategy
title_short Cloud Asset Identification Strategy
title_sort cloud asset identification strategy
title_txtP Cloud Asset Identification Strategy
topic Cloud IP identification Asset Dark Web Vulnerabilities Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus esineiden internet pilvipalvelut tietoturva tietosuoja cyber security Internet of things cloud services data security data protection
topic_facet 602 Asset Cloud Dark Web IP identification Internet of things Mathematical Information Technology Tietotekniikka Vulnerabilities cloud services cyber security data protection data security esineiden internet kyberturvallisuus pilvipalvelut tietosuoja tietoturva
url https://jyx.jyu.fi/handle/123456789/79613 http://www.urn.fi/URN:NBN:fi:jyu-202202021373
work_keys_str_mv AT jolkkonentomi cloudassetidentificationstrategy