fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kallio, Riina", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-11-02T06:37:51Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-11-02T06:37:51Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/83761", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkimuksessa tavoitteena oli selvitt\u00e4\u00e4, miten kyberturvallisuus vaikuttaa siviili-ilmailun turvaamiseen. Kyberturvallisuutta tarkastellaan tutkimuksessa kyberturvallisuuden hallintamallin kautta. Tarkastelun\u00e4k\u00f6kulma valittiin siviili-ilmailun turvallisuuden rakenteen my\u00f6t\u00e4, sill\u00e4 turvallisuustoimet perustuvat alalla vahvasti eri turvallisuuden hallintaj\u00e4rjestelmiin. Tutkimuksen rajaus keskittyy kaupalliseen lentoliikenteeseen ja rajaus koskee siviili-ilmailua suomalaisten toimijoiden n\u00e4k\u00f6kulmasta.\nTutkimuksen kirjallisuuskatsaus muodostuu kyberturvallisuuden hallinta-mallin sek\u00e4 siviili-ilmailun turvaamisen viitekehyksist\u00e4. Kyberturvallisuuden hallintamallin viitekehyksess\u00e4 k\u00e4sitell\u00e4\u00e4n kyberturvallisuutta k\u00e4sitteen\u00e4, kyber-turvallisuuden hallintaa, johtamisesta, riskienhallintaa sek\u00e4 resilienssi\u00e4. Viitekehykseen on otettu vertailtavaksi kaksi yleisesti tunnettua kyberturvallisuuteen ja tietoturvallisuuteen keskittyv\u00e4\u00e4 hallintamallia; NIST sek\u00e4 ISO/IEC 27001. Siviili-ilmailun turvaamisen viitekehys rakentuu siviili-ilmailun turvaamisen teoriasta, siviili-ilmailun turvaamisessa k\u00e4ytetyist\u00e4 hallintaj\u00e4rjestelmist\u00e4 sek\u00e4 siviili-ilmailun kyberturvallisuuden teoriasta. Lis\u00e4ksi viitekehykseen on sis\u00e4llytetty siviili-ilmailun turvaamisen ja ilmailun kyberturvallisuuden kannalta keskeisi\u00e4 s\u00e4\u00e4d\u00f6ksi\u00e4.\nTutkimus toteutettiin laadullisena tapaustutkimuksena ja aineistonkeruu-menetelm\u00e4n\u00e4 k\u00e4ytettiin systemaattista kirjallisuuskatsausta sek\u00e4 puolistrukturoituja teemahaastatteluita. Kaksi haastatteluista toteutettiin et\u00e4yhteyden avulla ja kaksi paikan p\u00e4\u00e4ll\u00e4 kasvotusten. Haastateltaviksi valittiin siviili-ilmailun turvallisuuden sek\u00e4 ilmailun kyberturvallisuuden asiantuntijoita ilmailualan organisaatioista sek\u00e4 Suomen ja Euroopan valvovan viranomaisen puolelta. Haastattelut litteroitiin, jonka j\u00e4lkeen tutkimustulokset teemoiteltiin lopulta nelj\u00e4\u00e4n p\u00e4\u00e4teemaan. Tutkimuksen tulokset muodostuivat kirjallisuuskatsauksen sek\u00e4 haastatteluanalyysin pohjalta. Johtop\u00e4\u00e4t\u00f6ksiss\u00e4 otettiin huomioon edelt\u00e4vien sy\u00f6tteiden lis\u00e4ksi aiempien tutkimusten l\u00f6yd\u00f6kset, jotka esiteltiin t\u00e4ss\u00e4 tutkimuksessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The aim of this study was to find out how cyber security affects the security of civil aviation. In the study, cyber security is examined through the cyber security management model. The review perspective was chosen along with the structure of civil aviation security, as security measures are strongly based on different security management systems in the sector. The delimitation of the study focuses on commercial air traffic and the delimitation applies to civil aviation from the point of view of Finnish operators.\nThe research's literature review consists of the cyber security management model and the reference frameworks for securing civil aviation. The framework of the cyber security management model discusses cyber security as a concept, cyber security management, management, risk management and resilience. Two commonly known management models focused on cyber security and information security have been included in the framework for comparison; NIST and ISO/IEC 27001. The reference framework for securing civil aviation is built on the theory of securing civil aviation, the management systems used in securing civil aviation and the theory of cyber security of civil aviation. In addition, the reference framework has included key regulations in terms of securing civil aviation and aviation cyber security.\nThe research was done as a qualitative case study and a systematic literature review and semi-structured thematic interviews were used as data collection methods. Two of the interviews were carried out remotely and two on site face to face. Civil aviation security and aviation cyber security experts from aviation industry organizations and Finnish and European supervisory authorities were chosen to be interviewed. The interviews were transcribed, after which the research results were finally themed into four main themes. The results of the study were formed based on a literature review and interview analysis. In addition to previous inputs, the conclusions considered the findings of previous studies, which were presented in this study.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-11-02T06:37:51Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-11-02T06:37:51Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "67", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuus osana siviili-ilmailun turvallisuutta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202211025066", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ilmailu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "lentoliikenne", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "lentoturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|