Miten käyttää salasanoja turvallisesti

Tämä kirjoitelma tarkastelee salasanojen turvallista käyttämistä nykypäiväisissä järjestelmissä. Kirjoitelmassa käydään läpi erilaisia kriteereitä, joita turvalliselle salasanalle on ja ongelmat, jotka niiden muistettavuudesta tulevat ilmi. Lopussa todetaan, että salasanamanagerien käyttö on tällä h...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Pishehgar, Arian
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2023
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/85123
_version_ 1828193197574062080
author Pishehgar, Arian
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Pishehgar, Arian Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Pishehgar, Arian Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Pishehgar, Arian
datasource_str_mv jyx
description Tämä kirjoitelma tarkastelee salasanojen turvallista käyttämistä nykypäiväisissä järjestelmissä. Kirjoitelmassa käydään läpi erilaisia kriteereitä, joita turvalliselle salasanalle on ja ongelmat, jotka niiden muistettavuudesta tulevat ilmi. Lopussa todetaan, että salasanamanagerien käyttö on tällä hetkellä turvallisin tapa ylläpitää käyttäjätunnuksia ja salasanoja eri palveluihin yhdessä kaksivaiheisen tunnistautumisen kanssa. This document examines the way to safely use passwords online for different services. It goes through different criteria that are set for strong passwords and the problems that arise from the memorability of said passwords. In the end it is discovered that using open-source 3rd party password managers in combination with two-factor authentication is the strongest way to manage your usernames and passwords for different services.
first_indexed 2024-09-11T08:52:08Z
format Kandityö
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pishehgar, Arian", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-01-23T06:45:02Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-01-23T06:45:02Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/85123", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kirjoitelma tarkastelee salasanojen turvallista k\u00e4ytt\u00e4mist\u00e4 nykyp\u00e4iv\u00e4isiss\u00e4 j\u00e4rjestelmiss\u00e4. Kirjoitelmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi erilaisia kriteereit\u00e4, joita turvalliselle salasanalle on ja ongelmat, jotka niiden muistettavuudesta tulevat ilmi. Lopussa todetaan, ett\u00e4 salasanamanagerien k\u00e4ytt\u00f6 on t\u00e4ll\u00e4 hetkell\u00e4 turvallisin tapa yll\u00e4pit\u00e4\u00e4 k\u00e4ytt\u00e4j\u00e4tunnuksia ja salasanoja eri palveluihin yhdess\u00e4 kaksivaiheisen tunnistautumisen kanssa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This document examines the way to safely use passwords online for different\nservices. It goes through different criteria that are set for strong passwords and the problems\nthat arise from the memorability of said passwords. In the end it is discovered that using\nopen-source 3rd party password managers in combination with two-factor authentication is\nthe strongest way to manage your usernames and passwords for different services.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-01-23T06:45:02Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-01-23T06:45:02Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "18", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "salasanamanageri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kaksivaiheinen tunnistus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "muistettavuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Miten k\u00e4ytt\u00e4\u00e4 salasanoja turvallisesti", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202301231421", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "identifiointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "s\u00e4hk\u00f6inen tunnistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_85123
language fin
last_indexed 2025-03-31T20:03:25Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Pishehgar, Arian Miten käyttää salasanoja turvallisesti salasanamanageri kaksivaiheinen tunnistus muistettavuus Tietotekniikka Mathematical Information Technology 602 tietoturva salasanat tietotekniikka käyttäjät Internet identifiointi sähköinen tunnistaminen turvallisuus
title Miten käyttää salasanoja turvallisesti
title_full Miten käyttää salasanoja turvallisesti
title_fullStr Miten käyttää salasanoja turvallisesti Miten käyttää salasanoja turvallisesti
title_full_unstemmed Miten käyttää salasanoja turvallisesti Miten käyttää salasanoja turvallisesti
title_short Miten käyttää salasanoja turvallisesti
title_sort miten käyttää salasanoja turvallisesti
title_txtP Miten käyttää salasanoja turvallisesti
topic salasanamanageri kaksivaiheinen tunnistus muistettavuus Tietotekniikka Mathematical Information Technology 602 tietoturva salasanat tietotekniikka käyttäjät Internet identifiointi sähköinen tunnistaminen turvallisuus
topic_facet 602 Internet Mathematical Information Technology Tietotekniikka identifiointi kaksivaiheinen tunnistus käyttäjät muistettavuus salasanamanageri salasanat sähköinen tunnistaminen tietotekniikka tietoturva turvallisuus
url https://jyx.jyu.fi/handle/123456789/85123 http://www.urn.fi/URN:NBN:fi:jyu-202301231421
work_keys_str_mv AT pishehgararian mitenkäyttääsalasanojaturvallisesti