fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Dauchy, Elina", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Lehikoinen, Jaakko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Salovaara, Sami", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-11-24T07:07:34Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-11-24T07:07:34Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/84064", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Organisaatioiden tietoturvallisuuden keski\u00f6ss\u00e4 ovat usein tietoturvan hallintaj\u00e4rjestelm\u00e4t. Tunnetuin tietoturvallisuuden hallintaj\u00e4rjestelmien standardeista\non ISO 27001. Hallintaj\u00e4rjestelmien luomiseen, kehitt\u00e4miseen, yll\u00e4pit\u00e4miseen ja\njalkauttamiseen vaaditaan jatkuvaa parantamista sek\u00e4 s\u00e4\u00e4nn\u00f6llisi\u00e4 tietoturva-auditointeja.\nT\u00e4m\u00e4n tutkimuksen tavoitteena oli luoda kokonaisvaltainen auditointimalli toimeksiantajan pilvipalvelupohjaisten tietoj\u00e4rjestelmien sek\u00e4 tietoturvaprosessien katselmointien suorittamiseen. Tutkimuksen tuloksena luotiin auditointimalli, jonka avulla kyettiin selvitt\u00e4m\u00e4\u00e4n toimeksiantajan esikuntatietoj\u00e4rjestelm\u00e4kokonaisuuden tietoturvallisuuden sek\u00e4 tietoturvallisuuden hallintaj\u00e4rjestelm\u00e4n nykytila ISO 27001 -standardin vaatimuksiin peilaten. Ty\u00f6n artefaktiksi muodostunut tietoturvallisuuden auditointimalli on yleisluontoiseksi kehitetty ty\u00f6kalupakki, jonka avulla auditointien suunnittelu, suorittaminen, raportointi sek\u00e4 parannussuunnittelu voidaan toteuttaa mahdollisimman j\u00e4rjestelm\u00e4riippumattomasti.\nTutkimus jakautuu kolmeen osaan. Teoriaosuudessa k\u00e4sitell\u00e4\u00e4n pilvipalveluiden auditointia, kulkua sek\u00e4 toteutusmenetelmi\u00e4, ISO 27001 sek\u00e4 ISO 27002 -standardeja ja tietoturvan hallintaj\u00e4rjestelmi\u00e4. K\u00e4yt\u00e4nn\u00f6n osuudessa luodaan auditointimalli toimeksiantajalle. Iteratiivisin menetelmin kehitetty\u00e4 auditointimallia testataan k\u00e4yt\u00e4nn\u00f6ss\u00e4 auditoimalla toimeksiantajan tietoj\u00e4rjestelmi\u00e4. Auditointimalli k\u00e4y l\u00e4pi nelj\u00e4 kehityskierrosta. Nelj\u00e4nnen iteraation versio on tutkimuksen liitteen\u00e4. Viimeisess\u00e4 osiossa k\u00e4yd\u00e4\u00e4n tutkimuksen aikana nousseet havainnot ja tulokset yhteen johtop\u00e4\u00e4t\u00f6sten muodossa. Kappaleessa k\u00e4sitell\u00e4\u00e4n my\u00f6s auditointimallin onnistumisia ja ep\u00e4onnistumisia, jatkokehitysmahdollisuuksia sek\u00e4 ty\u00f6h\u00f6n valittujen tutkimusmenetelmien kritiikki\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information security management systems, also known as ISMS, are often at the\nheart of the organization\u2019s information security. The most widely known of these\nISMS\u2019s is ISO 27001. The creation, development, maintenance, and implementation of ISMS requires continuous improvement and regular security auditing.\nThe goal of this thesis was to create a comprehensive model for cloud-based\ninformation system security auditing. The goal of this study was to create an auditing model which could be used to examine the client\u2019s cloud-based information systems\u2019, as well as ISMS\u2019s level of information security at the present\nstate compared to the requirements presented in ISO 27001 -standard. The resulting artefact of this study is a generic auditing model which can be used to plan,\nperform, report, and design the improvements.\nThe study is divided into three parts. First part focuses on the theory of auditing cloud-based services, ISO 27001 and ISO 27002 standards and information\nsecurity management systems. Practical part focuses on the research and development of the previously mentioned auditing model. Using iterative methods,\nthe auditing model is put to test by auditing the client\u2019s information systems.\nAuditing model goes through four cycles of development. The auditing model is\nincluded as an annex into this study. The final part of the thesis is reserved for\nconclusions. The successes and failures are discussed, as well as future development ideas for the auditing model.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-11-24T07:07:34Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-11-24T07:07:34Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "65", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO 27001", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO 27002", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "auditointimalli", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "ISO 27001 -standardiin perustuvan tietoturvan auditointimallin kehitt\u00e4minen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202211245337", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "business", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "auditointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|