fullrecord |
[{"key": "dc.contributor.advisor", "value": "Marttiin, Pentti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "L\u00e4ms\u00e4, Markus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-06-16T09:30:01Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-06-16T09:30:01Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81796", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kandidaatintutkielmassa k\u00e4sitell\u00e4\u00e4n kyberuhkiin valmistautumista erilaisten riskienhallintamallien n\u00e4k\u00f6kulmasta. Kyberuhat ja hy\u00f6kk\u00e4ykset ovat nyky-yhteiskunnassa n\u00e4kyvill\u00e4 yh\u00e4 enemm\u00e4n. Tutkielmassa vertaillaan eri riskienhallintamallien ominaisuuksia ja kyvykkyyksi\u00e4 toimia kyberuhkien ehk\u00e4isemisen v\u00e4lineen\u00e4, keskittyen p\u00e4\u00e4asiassa organisaation kokonaisvaltaisen riskienhallinnan (ERM) malleihin sek\u00e4 kill chain-malleihin. Tutkielman tarkoituksena on tunnistaa se riskienhallinnan viitekehys, jota hy\u00f6dynt\u00e4m\u00e4ll\u00e4 kyberuhkien torjunnalle tai lievitt\u00e4miselle esitetyt vaatimukset t\u00e4yttyv\u00e4t todenn\u00e4k\u00f6isimmin. Lis\u00e4ksi keskityt\u00e4\u00e4n havainnollistamaan mallin ominaisuuksia, kyvykkyyksi\u00e4 sek\u00e4 niiden vaikutusta mallin toimintaan. Tutkimusta tehokkaimman riskienhallintamallin tunnistamiseksi ei ole juurikaan saatavilla, etenk\u00e4\u00e4n kybermaailman ilmi\u00f6ihin keskittyen ja t\u00e4m\u00e4n vuoksi olisikin t\u00e4rke\u00e4\u00e4 saada organisaatioiden tietoon varteenotettavimmat ty\u00f6kalut kyberuhkien vastaiseen ty\u00f6h\u00f6n. Tutkimuksen tuloksena voidaan todeta, ett\u00e4 nimenomaisesti kyberuhkien torjuntaan tehokkaampi valinta ovat kill chain-malliset viitekehykset. Etenkin kokonaisvaltaisemmat ATT&CK- ja Cyber Kill Chain-viitekehykset kykenev\u00e4t t\u00e4ytt\u00e4m\u00e4\u00e4n riskienhallinnalle asetetut vaatimukset lievitysorientoitunutta STRIDE-mallia paremmin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis inspects preparing for cyber threats from the perspective of risk management models. Cyber threats and attacks are on the rise in modern society. The dissertation compares the features and capabilities of different risk management models as a tool of preventing cyber threats, focusing mainly on the comprehensive enterprise risk management (ERM) models and Kill Chain models. The purpose of the research is to identify the risk management frame-work that is most likely to meet the requirements for the prevention or mitigation of cyber threats. In addition, the focus is on illustrating the features and capabilities of the models and their impact on the operating capability of the models. There is little research available to identify the most effective risk management model, especially focusing on cyber environment, and it would therefore be important to provide organizations with the most relevant tools for working against cyber threats. As a result of the study, it can be stated that Kill Chain-based reference frames are a more effective choice for combating cyber threats. In particular, the more comprehensive ATT&CK and Cyber Kill Chain-frameworks are better able to meet the requirements of risk management than the mitigation-oriented STRIDE model.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-06-16T09:30:01Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-06-16T09:30:01Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "40", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ysten tunnistaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhkiin valmistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberuhkiin valmistautuminen : riskienhallintaty\u00f6kalujen vertailu", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202206163405", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "torjunta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "vertailu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|