fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kokko, Tuomas", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ryh\u00e4nen, Noora", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-01-27T07:27:08Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-01-27T07:27:08Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/85219", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Informaatioteknologian kehittyminen on lis\u00e4nnyt liiketoimintamahdollisuuksia, mutta samanaikaisesti kasvattanut tietoturvariskien m\u00e4\u00e4r\u00e4\u00e4. Tietoturvavahingot voivat aiheuttaa yrityksille erilaisia vahinkoja ja jopa tuhota koko tietoj\u00e4rjestelm\u00e4n. Ensimm\u00e4inen keino tietoturvauhkia vastaan on k\u00e4ytt\u00e4jien todentaminen ennen kuin he p\u00e4\u00e4sev\u00e4t sis\u00e4\u00e4n tietoj\u00e4rjestelmiin. Yleisimmin yritysj\u00e4rjestelmiin kirjaudutaan sis\u00e4\u00e4n yksivaiheisella tunnistautumisella k\u00e4ytt\u00e4m\u00e4ll\u00e4 salasanaa ja k\u00e4ytt\u00e4j\u00e4tunnusta. Yksivaiheisen tunnistautumisen on kuitenkin havaittu olevan turvallisuudeltaan riitt\u00e4m\u00e4t\u00f6n nykyp\u00e4iv\u00e4n uhkia vastaan. Suositeltavaa olisi ottaa k\u00e4ytt\u00f6\u00f6n monivaiheinen tunnistautuminen, joka lis\u00e4\u00e4 turvallisuutta. T\u00e4ss\u00e4 tutkielmassa selvitettiin, miksi yksivaiheinen tunnistautuminen on puutteellinen, ja mit\u00e4 riskej\u00e4 etenkin k\u00e4ytt\u00e4j\u00e4tunnuksella ja salasanalla kirjautumiseen liittyy. Lis\u00e4ksi tutkittiin, mitk\u00e4 monivaiheisen tunnistautumisen keinot voisivat olla yrityksille potentiaalisimmat huomioiden turvallisuus- ja k\u00e4ytett\u00e4vyysn\u00e4k\u00f6kulman. Salasanojen ja k\u00e4ytt\u00e4j\u00e4tunnusten huomattiin aiheuttavan riskej\u00e4 etenkin kognitiivisen kuormituksen ja k\u00e4ytt\u00e4jien heikon salasanahallinnan vuoksi. Potentiaalisimmiksi monivaiheisen tunnistautumisen keinoiksi tunnistettiin \u00e4lykortin tai biometriikan yhdist\u00e4minen salasanan kanssa. N\u00e4ist\u00e4 \u00e4lykorttipohjainen todennusj\u00e4rjestelm\u00e4 saattaa olla viel\u00e4 parempi, koska se ei ole niin herkk\u00e4 olosuhteille. Tutkielma toteutettiin systemaattisena kirjallisuuskatsauksena. Aineistona k\u00e4ytettiin p\u00e4\u00e4osin vertaisarvioituja tieteellisi\u00e4 artikkeleita, joita on etsitty JYKDOK-tietokannasta sek\u00e4 Google Scholar -hakupalvelusta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The development of information technology has increased business opportunities, but at the same time it has increased the number of security risks. Security breaches can cause various types of damage to companies and even destroy an entire information system. The first way to deal with security threats is to authenticate users before they have access to information systems. The most common way of logging into enterprise systems is through a single-factor authentication using a password and a username. However, single-factor authentication has been found to be insufficiently secure against current threats. The use of multi-factor authentication is recommended to increase security. This thesis explained why single-factor authentication is inadequate and what the risks are, especially when logging in with a username and password. It also analysed which multi-factor authentication methods could be the most potential for enterprises, considering security and usability aspects. Passwords and usernames were found to cause risks due to cognitive load and poor password management by users. Smart card-password and biometrics-password combinations were identified as the most potential multi-factor authentication methods. Of these, a smart card-based authentication system may be even better, as it is less sensitive to circumstances. The research was conducted as a systematic literature review. The sources used were mainly peer-reviewed scientific articles searched in the JYKDOK database and Google Scholar.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-01-27T07:27:08Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-01-27T07:27:08Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "26", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "monivaiheinen tunnistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yksivaiheinen tunnistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tunnistautumismenetelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "multi-factor authentication", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "single-factor authentication", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "authentication method", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information systems security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Yksivaiheisen tunnistautumisen puutteet ja monivaiheisen tunnistautumisen vaihtoehdot yritysj\u00e4rjestelmiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202301271510", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|