fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "M\u00e4ki-Maukola, Eeva", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-02-21T07:09:15Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-02-21T07:09:15Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/85559", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkimuksen tavoitteena oli selvitt\u00e4\u00e4, miten ISO 27000 -\ntietoturvastandardisarja on osana nykyp\u00e4iv\u00e4n yritysten tietoturvallisuuden\nhallintaa. Tutkimuksessa keskityt\u00e4\u00e4n standardeihin ISO 27000, ISO 27001 sek\u00e4\nISO 27002, joista ISO 27001 -standardia k\u00e4siteltiin yrityksille my\u00f6nnett\u00e4v\u00e4n ISO\n27001 -sertifikaatin avulla. N\u00e4k\u00f6kulma tarkasteluun valittiin kyseisten\nstandardien my\u00f6t\u00e4, sill\u00e4 ne keskittyv\u00e4t olennaisesti yritysten tietoturvallisuuden\nhallintaan sek\u00e4 sen suunnitteluun, toteutukseen, yll\u00e4pitoon ja parantamiseen.\nTutkimuksen rajaus kohdistettiin Suomessa toimiviin eri liiketoiminta-alan\nyrityksiin, jotka ovat viime vuosien aikana saavuttaneet ISO 27001 -sertifikaatin.\nTutkimuksen kirjallisuuskatsaus muodostuu yritysten tietoturvallisuuden\nhallinnasta sek\u00e4 tietoturvapolitiikan ja tietoturvan hallintaj\u00e4rjestelm\u00e4n\nviitekehyksest\u00e4. Kirjallisuuskatsauksessa keskityt\u00e4\u00e4n my\u00f6s ISO 27000 -\ntietoturvastandardisarjaan ja erityisesti standardeihin ISO 27000, ISO 27001 ja\nISO 27002, sek\u00e4 niiden historiaan ja kehitykseen aina nykyhetkeen asti.\nT\u00e4m\u00e4 tutkimus toteutettiin laadullisena tutkimuksena ja laadullisen\naineiston ker\u00e4\u00e4miseen k\u00e4ytettiin s\u00e4hk\u00f6ist\u00e4 kyselylomaketta, johon vastasivat\ntutkimukseen osallistuneet yritysten edustajat. Tutkimuksen tulosten tavoitteena\noli selvitt\u00e4\u00e4, kuinka tutkimukseen osallistuvat yritykset k\u00e4ytt\u00e4v\u00e4t standardeja\nISO 27000 ja ISO 27002 tietoturvallisuutensa hallinnassa sek\u00e4 sen ohjaamisessa.\nTulosten tavoitteena oli my\u00f6s tarkastella yritysten saavuttaman ISO 27001 -\nsertifikaatin hakuprosessia muun muassa sen keston ja haastavuuden\nn\u00e4k\u00f6kulmista.\nTutkimukseen osallistui nelj\u00e4 yrityst\u00e4, joten otanta oli pieni. T\u00e4m\u00e4n takia\nyleist\u00e4vien p\u00e4\u00e4telmien teko Suomessa toimivien eri liiketoiminta-alan yritysten\ntietoturvallisuuden hallinnasta ei voida tehd\u00e4. Tutkimustulokset kuitenkin\nantavat yleiskatsauksen juuri t\u00e4m\u00e4n tutkimukseen osallistuneiden yritysten\ntietoturvallisuuden hallinnasta ISO 27000 -tietoturvastandardin avulla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The aim of this study was to find out how the ISO 27000 series of information\nsecurity standards is part of today's organizations information security\nmanagement. The research focuses on the standards ISO 27000, ISO 27001, and\nISO 27002, of which the ISO 27001 standard was handled with the help of the ISO\n27001 certificate granted to organizations. The perspective for the review was\nchosen along with the standards in question, as they essentially focus on the\nmanagement of organizations information security and its planning,\nimplementation, maintenance and improvement. The scope of the research was\nfocused on organizations operating in various business sectors in Finland, which\nhave achieved the ISO 27001 certificate in recent years.\nThe literature review of the research consists of the information security\nmanagement of organizations and the reference framework of the information\nsecurity policy and information security management system. The literature\nreview also focuses on the ISO 27000 series of information security standards and\nespecially the standards ISO 27000, ISO 27001 and ISO 27002, as well as their\nhistory and development up to the present.\nThis study was carried out as a qualitative study and an electronic\nquestionnaire was used to collect qualitative data, which was answered by the\nrepresentatives of the organizations that participated in the study. The aim of the\nresults of the study was to find out how the organizations participating in the\nstudy use the standards ISO 27000 and ISO 27002 in managing and directing their\ninformation security. The goal of the results was also to examine the application\nprocess for the ISO 27001 certificate achieved by the companies, for example from\nthe perspective of its duration and challenge.\nFour organizations participated in the study, so the sample was small.\nBecause of this, it is not possible to make generalizing conclusions about the\ninformation security management of organizations operating in different\nbusiness sectors in Finland. The research results, however, give an overview of\nthe information security management of the organizations that participated in\nthe research using the ISO 27000 information security standard.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-02-21T07:09:15Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-02-21T07:09:15Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "62", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO 27000", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO 27001", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO 27002", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvastandardisarja", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvastandardi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvan hallintaj\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO 27001 - sertifikaatti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "ISO 27000 -tietoturvastandardisarja osana nykyp\u00e4iv\u00e4n yritysten tietoturvallisuuden hallintaa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202302211818", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|