VoIP ja tietoturva

VoIP-teknologian laajentuvan käytön myötä sen tietoturvasta tulee entistä ajankohtaisempaa. Tämän kirjallisuuskatsauksen tavoitteena on luoda yleinen käsitys VoIP-teknologian sisällöstä, sitä hyödyntävistä hyökkäyskeinoista ja kyseisiä hyökkäyksiä vastustavista puolustuskeinoista. Hyökkäyskeinoihin...

Full description

Bibliographic Details
Main Author: Kanninen, Joonas
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/81360
_version_ 1826225799998472192
author Kanninen, Joonas
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Kanninen, Joonas Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kanninen, Joonas Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Kanninen, Joonas
datasource_str_mv jyx
description VoIP-teknologian laajentuvan käytön myötä sen tietoturvasta tulee entistä ajankohtaisempaa. Tämän kirjallisuuskatsauksen tavoitteena on luoda yleinen käsitys VoIP-teknologian sisällöstä, sitä hyödyntävistä hyökkäyskeinoista ja kyseisiä hyökkäyksiä vastustavista puolustuskeinoista. Hyökkäyskeinoihin tutustuessa ilmenee, että muista Internet-sovelluksista tuttuja hyökkäyksiä voidaan toteuttaa myös VoIP:lla. Hyökkäyksissä saatetaan hyödyntää lisäksi VoIP:n omia ominaisuuksia. Vastaavasti hyökkäyksiltä puolustautuessa voidaan hyödyntää sekä muille Internet-sovelluksille kehitettyjä keinoja, että puheen ominaisia piirteitä. As the use of VoIP technology expands, its security becomes increasingly relevant. The purpose of this literature review is to create a general understanding of VoIP technology, attacks utilising VoIP and methods for defending against aforementioned attacks. An examination into the methods of attack reveals that familiar attacks from other Internet applications can be imported to VoIP. Attacks can also utilise VoIP's own properties. Similarly, defence can also utilise methods imported from other Internet applications along with the characteristic properties of speech.
first_indexed 2024-09-11T08:49:05Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Juutinen, Sanna", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kanninen, Joonas", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-05-31T06:42:06Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-05-31T06:42:06Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81360", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "VoIP-teknologian laajentuvan k\u00e4yt\u00f6n my\u00f6t\u00e4 sen tietoturvasta tulee entist\u00e4 ajankohtaisempaa. T\u00e4m\u00e4n kirjallisuuskatsauksen tavoitteena on luoda yleinen k\u00e4sitys VoIP-teknologian sis\u00e4ll\u00f6st\u00e4, sit\u00e4 hy\u00f6dynt\u00e4vist\u00e4 hy\u00f6kk\u00e4yskeinoista ja kyseisi\u00e4 hy\u00f6kk\u00e4yksi\u00e4 vastustavista puolustuskeinoista. Hy\u00f6kk\u00e4yskeinoihin tutustuessa ilmenee, ett\u00e4 muista Internet-sovelluksista tuttuja hy\u00f6kk\u00e4yksi\u00e4 voidaan toteuttaa my\u00f6s VoIP:lla. Hy\u00f6kk\u00e4yksiss\u00e4 saatetaan hy\u00f6dynt\u00e4\u00e4 lis\u00e4ksi VoIP:n omia ominaisuuksia. Vastaavasti hy\u00f6kk\u00e4yksilt\u00e4 puolustautuessa voidaan hy\u00f6dynt\u00e4\u00e4 sek\u00e4 muille Internet-sovelluksille kehitettyj\u00e4 keinoja, ett\u00e4 puheen ominaisia piirteit\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "As the use of VoIP technology expands, its security becomes increasingly relevant. The purpose of this literature review is to create a general understanding of VoIP technology, attacks utilising VoIP and methods for defending against aforementioned attacks. An examination into the methods of attack reveals that familiar attacks from other Internet applications can be imported to VoIP. Attacks can also utilise VoIP's own properties. Similarly, defence can also utilise methods imported from other Internet applications along with the characteristic properties of speech.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-05-31T06:42:06Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-05-31T06:42:06Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "18", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "VoIP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Voice over Internet Protocol", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "VoIP ja tietoturva", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202205312982", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_81360
language fin
last_indexed 2025-02-18T10:56:13Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/516e3a14-f7aa-446c-a846-2d633f710997\/download","text":"URN:NBN:fi:jyu-202205312982.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Kanninen, Joonas VoIP ja tietoturva VoIP Voice over Internet Protocol Tietotekniikka Mathematical Information Technology 602 tietoturva
title VoIP ja tietoturva
title_full VoIP ja tietoturva
title_fullStr VoIP ja tietoturva VoIP ja tietoturva
title_full_unstemmed VoIP ja tietoturva VoIP ja tietoturva
title_short VoIP ja tietoturva
title_sort voip ja tietoturva
title_txtP VoIP ja tietoturva
topic VoIP Voice over Internet Protocol Tietotekniikka Mathematical Information Technology 602 tietoturva
topic_facet 602 Mathematical Information Technology Tietotekniikka VoIP Voice over Internet Protocol tietoturva
url https://jyx.jyu.fi/handle/123456789/81360 http://www.urn.fi/URN:NBN:fi:jyu-202205312982
work_keys_str_mv AT kanninenjoonas voipjatietoturva