Kyberuhkiin valmistautuminen riskienhallintatyökalujen vertailu

Tässä kandidaatintutkielmassa käsitellään kyberuhkiin valmistautumista erilaisten riskienhallintamallien näkökulmasta. Kyberuhat ja hyökkäykset ovat nyky-yhteiskunnassa näkyvillä yhä enemmän. Tutkielmassa vertaillaan eri riskienhallintamallien ominaisuuksia ja kyvykkyyksiä toimia kyberuhkien ehkäise...

Full description

Bibliographic Details
Main Author: Lämsä, Markus
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/81796
_version_ 1826225814255960064
author Lämsä, Markus
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Lämsä, Markus Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Lämsä, Markus Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Lämsä, Markus
datasource_str_mv jyx
description Tässä kandidaatintutkielmassa käsitellään kyberuhkiin valmistautumista erilaisten riskienhallintamallien näkökulmasta. Kyberuhat ja hyökkäykset ovat nyky-yhteiskunnassa näkyvillä yhä enemmän. Tutkielmassa vertaillaan eri riskienhallintamallien ominaisuuksia ja kyvykkyyksiä toimia kyberuhkien ehkäisemisen välineenä, keskittyen pääasiassa organisaation kokonaisvaltaisen riskienhallinnan (ERM) malleihin sekä kill chain-malleihin. Tutkielman tarkoituksena on tunnistaa se riskienhallinnan viitekehys, jota hyödyntämällä kyberuhkien torjunnalle tai lievittämiselle esitetyt vaatimukset täyttyvät todennäköisimmin. Lisäksi keskitytään havainnollistamaan mallin ominaisuuksia, kyvykkyyksiä sekä niiden vaikutusta mallin toimintaan. Tutkimusta tehokkaimman riskienhallintamallin tunnistamiseksi ei ole juurikaan saatavilla, etenkään kybermaailman ilmiöihin keskittyen ja tämän vuoksi olisikin tärkeää saada organisaatioiden tietoon varteenotettavimmat työkalut kyberuhkien vastaiseen työhön. Tutkimuksen tuloksena voidaan todeta, että nimenomaisesti kyberuhkien torjuntaan tehokkaampi valinta ovat kill chain-malliset viitekehykset. Etenkin kokonaisvaltaisemmat ATT&CK- ja Cyber Kill Chain-viitekehykset kykenevät täyttämään riskienhallinnalle asetetut vaatimukset lievitysorientoitunutta STRIDE-mallia paremmin. This bachelor’s thesis inspects preparing for cyber threats from the perspective of risk management models. Cyber threats and attacks are on the rise in modern society. The dissertation compares the features and capabilities of different risk management models as a tool of preventing cyber threats, focusing mainly on the comprehensive enterprise risk management (ERM) models and Kill Chain models. The purpose of the research is to identify the risk management frame-work that is most likely to meet the requirements for the prevention or mitigation of cyber threats. In addition, the focus is on illustrating the features and capabilities of the models and their impact on the operating capability of the models. There is little research available to identify the most effective risk management model, especially focusing on cyber environment, and it would therefore be important to provide organizations with the most relevant tools for working against cyber threats. As a result of the study, it can be stated that Kill Chain-based reference frames are a more effective choice for combating cyber threats. In particular, the more comprehensive ATT&CK and Cyber Kill Chain-frameworks are better able to meet the requirements of risk management than the mitigation-oriented STRIDE model.
first_indexed 2024-09-11T08:51:34Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Marttiin, Pentti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "L\u00e4ms\u00e4, Markus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-06-16T09:30:01Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-06-16T09:30:01Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81796", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kandidaatintutkielmassa k\u00e4sitell\u00e4\u00e4n kyberuhkiin valmistautumista erilaisten riskienhallintamallien n\u00e4k\u00f6kulmasta. Kyberuhat ja hy\u00f6kk\u00e4ykset ovat nyky-yhteiskunnassa n\u00e4kyvill\u00e4 yh\u00e4 enemm\u00e4n. Tutkielmassa vertaillaan eri riskienhallintamallien ominaisuuksia ja kyvykkyyksi\u00e4 toimia kyberuhkien ehk\u00e4isemisen v\u00e4lineen\u00e4, keskittyen p\u00e4\u00e4asiassa organisaation kokonaisvaltaisen riskienhallinnan (ERM) malleihin sek\u00e4 kill chain-malleihin. Tutkielman tarkoituksena on tunnistaa se riskienhallinnan viitekehys, jota hy\u00f6dynt\u00e4m\u00e4ll\u00e4 kyberuhkien torjunnalle tai lievitt\u00e4miselle esitetyt vaatimukset t\u00e4yttyv\u00e4t todenn\u00e4k\u00f6isimmin. Lis\u00e4ksi keskityt\u00e4\u00e4n havainnollistamaan mallin ominaisuuksia, kyvykkyyksi\u00e4 sek\u00e4 niiden vaikutusta mallin toimintaan. Tutkimusta tehokkaimman riskienhallintamallin tunnistamiseksi ei ole juurikaan saatavilla, etenk\u00e4\u00e4n kybermaailman ilmi\u00f6ihin keskittyen ja t\u00e4m\u00e4n vuoksi olisikin t\u00e4rke\u00e4\u00e4 saada organisaatioiden tietoon varteenotettavimmat ty\u00f6kalut kyberuhkien vastaiseen ty\u00f6h\u00f6n. Tutkimuksen tuloksena voidaan todeta, ett\u00e4 nimenomaisesti kyberuhkien torjuntaan tehokkaampi valinta ovat kill chain-malliset viitekehykset. Etenkin kokonaisvaltaisemmat ATT&CK- ja Cyber Kill Chain-viitekehykset kykenev\u00e4t t\u00e4ytt\u00e4m\u00e4\u00e4n riskienhallinnalle asetetut vaatimukset lievitysorientoitunutta STRIDE-mallia paremmin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis inspects preparing for cyber threats from the perspective of risk management models. Cyber threats and attacks are on the rise in modern society. The dissertation compares the features and capabilities of different risk management models as a tool of preventing cyber threats, focusing mainly on the comprehensive enterprise risk management (ERM) models and Kill Chain models. The purpose of the research is to identify the risk management frame-work that is most likely to meet the requirements for the prevention or mitigation of cyber threats. In addition, the focus is on illustrating the features and capabilities of the models and their impact on the operating capability of the models. There is little research available to identify the most effective risk management model, especially focusing on cyber environment, and it would therefore be important to provide organizations with the most relevant tools for working against cyber threats. As a result of the study, it can be stated that Kill Chain-based reference frames are a more effective choice for combating cyber threats. In particular, the more comprehensive ATT&CK and Cyber Kill Chain-frameworks are better able to meet the requirements of risk management than the mitigation-oriented STRIDE model.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-06-16T09:30:01Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-06-16T09:30:01Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "40", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ysten tunnistaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhkiin valmistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberuhkiin valmistautuminen : riskienhallintaty\u00f6kalujen vertailu", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202206163405", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "torjunta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "vertailu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_81796
language fin
last_indexed 2025-02-18T10:56:40Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/32105a5c-66e0-4e32-aa2f-627cbdaa4fc9\/download","text":"URN:NBN:fi:jyu-202206163405.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Lämsä, Markus Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu kyberuhka kyberhyökkäys kyberhyökkäysten tunnistaminen kyberuhkiin valmistautuminen Tietojärjestelmätiede Information Systems Science 601 riskienhallinta kyberturvallisuus verkkohyökkäykset riskit torjunta vertailu turvallisuus kyberrikollisuus
title Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu
title_full Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu
title_fullStr Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu
title_full_unstemmed Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu
title_short Kyberuhkiin valmistautuminen
title_sort kyberuhkiin valmistautuminen riskienhallintatyökalujen vertailu
title_sub riskienhallintatyökalujen vertailu
title_txtP Kyberuhkiin valmistautuminen : riskienhallintatyökalujen vertailu
topic kyberuhka kyberhyökkäys kyberhyökkäysten tunnistaminen kyberuhkiin valmistautuminen Tietojärjestelmätiede Information Systems Science 601 riskienhallinta kyberturvallisuus verkkohyökkäykset riskit torjunta vertailu turvallisuus kyberrikollisuus
topic_facet 601 Information Systems Science Tietojärjestelmätiede kyberhyökkäys kyberhyökkäysten tunnistaminen kyberrikollisuus kyberturvallisuus kyberuhka kyberuhkiin valmistautuminen riskienhallinta riskit torjunta turvallisuus verkkohyökkäykset vertailu
url https://jyx.jyu.fi/handle/123456789/81796 http://www.urn.fi/URN:NBN:fi:jyu-202206163405
work_keys_str_mv AT lämsämarkus kyberuhkiinvalmistautuminenriskienhallintatyökalujenvertailu