Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan

Injektiot ovat olleet uhkana kaikenlaisille sovelluksille jo pitkään ja niiden ehkäisyyn on esitetty todella monia eri keinoja. Vaikka injektioiden ehkäisyä on tutkittu paljon, ovat inkjektiot vieläkin yksi yleisimmistä tietoturvauhkista. Tämän tutkimuksen tarkoituksena on kartoittaa parhaimmat ehkä...

Full description

Bibliographic Details
Main Author: Loisti, Reko
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/81187
_version_ 1828193201575428096
author Loisti, Reko
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Loisti, Reko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Loisti, Reko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Loisti, Reko
datasource_str_mv jyx
description Injektiot ovat olleet uhkana kaikenlaisille sovelluksille jo pitkään ja niiden ehkäisyyn on esitetty todella monia eri keinoja. Vaikka injektioiden ehkäisyä on tutkittu paljon, ovat inkjektiot vieläkin yksi yleisimmistä tietoturvauhkista. Tämän tutkimuksen tarkoituksena on kartoittaa parhaimmat ehkäisykeinot SQL-, XSS-, ja komentorivi-injektiolle ja yrittää löytää niiden ehkäisystä yleisiä teemoja. Injections have been a threat to application level security for a long time and there have been many ways presented to stop them. Although injections have been widely studied they are still one of the biggest threats to application security. This study aims to find the best ways to combat SQL-, XSS, and Shell-injections and to find common themes from their prevention.
first_indexed 2022-05-20T20:00:37Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Rossi, Tuomo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Loisti, Reko", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-05-20T06:42:29Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-05-20T06:42:29Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81187", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Injektiot ovat olleet uhkana kaikenlaisille sovelluksille jo pitk\u00e4\u00e4n ja niiden ehk\u00e4isyyn on esitetty todella monia eri keinoja. Vaikka injektioiden ehk\u00e4isy\u00e4 on tutkittu paljon, ovat inkjektiot viel\u00e4kin yksi yleisimmist\u00e4 tietoturvauhkista. T\u00e4m\u00e4n tutkimuksen tarkoituksena on kartoittaa parhaimmat ehk\u00e4isykeinot SQL-, XSS-, ja komentorivi-injektiolle ja yritt\u00e4\u00e4 l\u00f6yt\u00e4\u00e4 niiden ehk\u00e4isyst\u00e4 yleisi\u00e4 teemoja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Injections have been a threat to application level security for a long time and there have been many ways presented to stop them. Although injections have been widely studied they are still one of the biggest threats to application security. This study aims to find the best ways to combat SQL-, XSS, and Shell-injections and to find common themes from their prevention.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-05-20T06:42:29Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-05-20T06:42:29Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "24", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmistoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Injektioiden turvallisuusuhat ja parhaat keinot niita\u0308 vastaan", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202205202819", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "injektiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ennaltaehk\u00e4isy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sovellusohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_81187
language fin
last_indexed 2025-03-31T20:02:45Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/5eeb49a4-383f-4d2a-bd9c-5deb24867542\/download","text":"URN:NBN:fi:jyu-202205202819.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Loisti, Reko Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan ohjelmistoturvallisuus Tietotekniikka Mathematical Information Technology 602 tietoturva injektiot ennaltaehkäisy sovellusohjelmat ohjelmointi
title Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan
title_full Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan
title_fullStr Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan
title_full_unstemmed Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan
title_short Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan
title_sort injektioiden turvallisuusuhat ja parhaat keinot niita vastaan
title_txtP Injektioiden turvallisuusuhat ja parhaat keinot niitä vastaan
topic ohjelmistoturvallisuus Tietotekniikka Mathematical Information Technology 602 tietoturva injektiot ennaltaehkäisy sovellusohjelmat ohjelmointi
topic_facet 602 Mathematical Information Technology Tietotekniikka ennaltaehkäisy injektiot ohjelmistoturvallisuus ohjelmointi sovellusohjelmat tietoturva
url https://jyx.jyu.fi/handle/123456789/81187 http://www.urn.fi/URN:NBN:fi:jyu-202205202819
work_keys_str_mv AT loistireko injektioidenturvallisuusuhatjaparhaatkeinotniitavastaan AT loistireko injektioidenturvallisuusuhatjaparhaatkeinotniitävastaan