Tiedonkeruu penetraatiotestauksessa

Tämän tutkielman aihe on tiedonkeruu penetraatiotestauksessa. Penetraatiotestaukseen tutustuminen on helppo aloittaa ensimmäisestä vaiheesta eli tiedonkeruusta. Tutkielmassa tutkitaan, mitä työkaluja tiedonkeruuseen käytetään. Lisäksi selvitetään työkalujen eroja. Tutkimuksessa selvisi, että menete...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Järvinen, Viivi
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2022
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/81121
_version_ 1826225798778978304
author Järvinen, Viivi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Järvinen, Viivi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Järvinen, Viivi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Järvinen, Viivi
datasource_str_mv jyx
description Tämän tutkielman aihe on tiedonkeruu penetraatiotestauksessa. Penetraatiotestaukseen tutustuminen on helppo aloittaa ensimmäisestä vaiheesta eli tiedonkeruusta. Tutkielmassa tutkitaan, mitä työkaluja tiedonkeruuseen käytetään. Lisäksi selvitetään työkalujen eroja. Tutkimuksessa selvisi, että menetelmien näkyvyyksissä ja käytettävyyksissä on eroja. Tutkimus antaa lukijalle hyvät pohjatiedot tiedonkeruuseen. The topic of this thesis is information gathering in penetration testing. Familia- rization with penetration testing is easy to start from the first step which is information gathering. The focus of this study is to map out the tools that are used in information gathering. The goal is to find out their purpose and how they differ from each other. This study showed that there are differences in visibility and usability. This thesis is a good way to get to know the information gathering phase.
first_indexed 2022-05-18T20:06:18Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Saksa, Tytti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "J\u00e4rvinen, Viivi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-05-18T05:17:42Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-05-18T05:17:42Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81121", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkielman aihe on tiedonkeruu penetraatiotestauksessa. Penetraatiotestaukseen tutustuminen on helppo aloittaa ensimm\u00e4isest\u00e4 vaiheesta eli tiedonkeruusta. Tutkielmassa tutkitaan, mit\u00e4 ty\u00f6kaluja tiedonkeruuseen k\u00e4ytet\u00e4\u00e4n. \nLis\u00e4ksi selvitet\u00e4\u00e4n ty\u00f6kalujen eroja. Tutkimuksessa selvisi, ett\u00e4 menetelmien n\u00e4kyvyyksiss\u00e4 ja k\u00e4ytett\u00e4vyyksiss\u00e4 on eroja. Tutkimus antaa lukijalle hyv\u00e4t pohjatiedot tiedonkeruuseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The topic of this thesis is information gathering in penetration testing. Familia- \nrization with penetration testing is easy to start from the first step which is information gathering. The focus of this study is to map out the tools that are used in information gathering. The goal is to find out their purpose and how they differ from each other. This study showed that there are differences in visibility and usability. This thesis is a good way to get to know the information gathering phase.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-05-18T05:17:42Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-05-18T05:17:42Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tiedonkeruu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "penetraatiotestaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "google-hakkerointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "social engineering", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tiedonkeruu penetraatiotestauksessa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202205182756", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedustelu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedonhankinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_81121
language fin
last_indexed 2025-02-18T10:54:24Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/065080ac-377f-45f6-981a-2407c409bc65\/download","text":"URN:NBN:fi:jyu-202205182756.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Järvinen, Viivi Tiedonkeruu penetraatiotestauksessa tiedonkeruu penetraatiotestaus google-hakkerointi social engineering Tietotekniikka Mathematical Information Technology 602 tiedustelu tiedonhankinta tietotekniikka
title Tiedonkeruu penetraatiotestauksessa
title_full Tiedonkeruu penetraatiotestauksessa
title_fullStr Tiedonkeruu penetraatiotestauksessa Tiedonkeruu penetraatiotestauksessa
title_full_unstemmed Tiedonkeruu penetraatiotestauksessa Tiedonkeruu penetraatiotestauksessa
title_short Tiedonkeruu penetraatiotestauksessa
title_sort tiedonkeruu penetraatiotestauksessa
title_txtP Tiedonkeruu penetraatiotestauksessa
topic tiedonkeruu penetraatiotestaus google-hakkerointi social engineering Tietotekniikka Mathematical Information Technology 602 tiedustelu tiedonhankinta tietotekniikka
topic_facet 602 Mathematical Information Technology Tietotekniikka google-hakkerointi penetraatiotestaus social engineering tiedonhankinta tiedonkeruu tiedustelu tietotekniikka
url https://jyx.jyu.fi/handle/123456789/81121 http://www.urn.fi/URN:NBN:fi:jyu-202205182756
work_keys_str_mv AT järvinenviivi tiedonkeruupenetraatiotestauksessa