fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "J\u00e4rvenp\u00e4\u00e4, Sakari", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-12-08T08:07:57Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-12-08T08:07:57Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/84224", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tuotannollisten ymp\u00e4rist\u00f6jen toiminnan tehostaminen ja digitalisointi ovat avainasemassa yrityksien kilpailukyvyn ja toiminnan kannalta. Tuotannon ongelmaton toiminta on jokaisen yrityksen elinehto, ja t\u00e4st\u00e4 syyst\u00e4 erilaisia tuotantoymp\u00e4rist\u00f6n h\u00e4iri\u00f6it\u00e4 pyrit\u00e4\u00e4n minimoimaan. Digitalisaation my\u00f6t\u00e4 tuotannossa toimiva informaatioteknologia on muodostanut toiminnalle mahdollistavat tekij\u00e4t, mutta samanaikaisesti on eritt\u00e4in kriittisess\u00e4 roolissa yrityksen menestymisen kannalta.\nT\u00e4ss\u00e4 pro gradu -tutkielmassa tutkitaan tuotannollisten IT-ymp\u00e4rist\u00f6jen haasteita kyberuhkien hallinnan n\u00e4k\u00f6kulmasta. Tutkimuksessa vastataan seuraaviin tutkimuskysymyksiin: \u201dMillaisia haasteita tuotannon IT-ymp\u00e4rist\u00f6ss\u00e4 ilmenee kyberuhkien n\u00e4k\u00f6kulmasta?\u201d sek\u00e4 \u201dMiten yritykset ovat varautuneet tuotannon IT-ymp\u00e4rist\u00f6n kyberuhkiin?\u201d. Tutkimus koostuu kirjallisuuskatsauksesta, joka luo pohjan tutkimuksessa toteutettavalle laadulliselle tapaustutkimukselle. Oleellista organisaation kriittisen infrastruktuurin ja IT-ymp\u00e4rist\u00f6n turvaamiseksi ja kyberuhkien ehk\u00e4isemiseksi on tunnistaa mahdolliset riskit sek\u00e4 toteuttaa tarvittavat kontrollit riskien pienent\u00e4miseksi. T\u00e4ysin riskit\u00f6nt\u00e4 tuotantoymp\u00e4rist\u00f6\u00e4 on todellisuudessa eritt\u00e4in haasteellista rakentaa, joten organisaation tulee my\u00f6s tiedostaa mahdolliset uhkakuvat sek\u00e4 niiden toteutuessa my\u00f6s seuraamukset. Organisaatioiden tulee kyet\u00e4 sitouttamaan vastuulliset henkil\u00f6t vastaamaan n\u00e4iden kontrollien toteutumisesta, mutta samalla osallistamaan kaikki organisaation henkil\u00f6t toteuttamaan laadittuja tietoturvaohjeistuksia. My\u00f6s yrityksen johto ja vastuulliset henkil\u00f6t tulee kyet\u00e4 sitouttamaan tietoturvatavoitteisiin sek\u00e4 lopulta my\u00f6s vastaamaan tietoturvatason yll\u00e4pit\u00e4misest\u00e4 ja kontrolloinnista. Mahdollinen kyberhy\u00f6kk\u00e4ys voi pahimmillaan vaikuttaa tuotannolliseen toimintaan kriittisesti, jolloin organisaation liiketoiminnalliset tappiot voivat kasvaa hetkess\u00e4 todella merkitt\u00e4v\u00e4ksi. Pahimmissa tapauksissa seuraamukset voivat vaarantaa my\u00f6s ihmishenki\u00e4. Niinp\u00e4 organisaation tuotantoymp\u00e4rist\u00f6, it-ratkaisut, prosessit sek\u00e4 henkil\u00f6st\u00f6 muodostavat kriittisen kokonaisuuden, jota tulee kyet\u00e4 hallitsemaan. Organisaatiot voivat hy\u00f6dynt\u00e4\u00e4 hallinnassa erilaisia viitekehyksi\u00e4, standardeja tai teorioita, mutta lopulta tuotantoymp\u00e4rist\u00f6 on poikkeuksellinen kokonaisuus, jota on hankalaa yleist\u00e4\u00e4 sen uniikin rakenteen vuoksi. T\u00e4st\u00e4 syyst\u00e4 hallintaan tulee k\u00e4ytt\u00e4\u00e4 resursseja ja samalla muodostaa organisaatio- ja ymp\u00e4rist\u00f6kohtaisia kontrolleja ja toimintatapoja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Streamlining and digitizing the operations of production environments are key to companies' competitiveness and operations. Problem-free operation of production is the lifeblood of every company, and for this reason various disturbances in the production environment are tried to be minimized. With digitization, the information technology that works in production has formed the enabling factors for the operation, but at the same time it plays a very critical role in terms of the company's success. This master's thesis examines the challenges of production IT environments from the perspective of cyber threat management. The research answers the following research questions: \"What kind of challenges appear in the production IT environment from the point of view of cyber threats?\" and \"How are companies prepared for cyber threats in the production IT environment?\". The research consists of a literature review, which creates the basis for the qualitative case study implemented in the research. To secure the organization's critical infrastructure and IT environment and to prevent cyber threats, it is essential to identify potential risks and implement the necessary controls to reduce the risks. It is actually very challenging to build a completely risk-free production environment, so the organization must also be aware of possible threats and, if they occur, also the sanctions. Organizations must be able to bind the responsible persons to be responsible for the implementation of these controls, but at the same time involve all the persons in the organization in implementing the prepared information security guidelines. The company's management and responsible persons must also be able to commit to information security goals and ultimately also be responsible for maintaining and controlling the information security level. At worst, a possible cyber-attack can critically affect the production activities, in which case the organization's business losses can become significant in an instant. In the worst cases, the consequences can also endanger human lives. Therefore, the organization's production environment, IT solutions, processes and personnel form a critical entity that must be managed. Organizations can use different frameworks, standards, or theories in management, but ultimately the production environment is an exceptional entity that is difficult to generalize due to its unique structure. For this reason, resources must be used for management and, at the same time, organizational and environment-specific controls and procedures must be established.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-12-08T08:07:57Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-12-08T08:07:57Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "67", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "teollinen internet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tuotantoymp\u00e4rist\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tuotannollisten IT-ymp\u00e4rist\u00f6jen haasteet kyberuhkien hallittavuuden n\u00e4k\u00f6kulmasta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202212085486", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|