Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen

Kahden pääaineen yhteisessä pro gradu -tutkielmassa tarkasteltiin taistelualusta merellisessä kybertoimintaympäristössä. Tutkimusongelmana tarkasteltiin, miten merenkulkualan yleisimmät kyberuhkat voisivat vaikuttaa taistelualuksen taistelujärjestelmään. Tarkastelua varten mallinnettiin geneerinen I...

Full description

Bibliographic Details
Main Author: Norilo, Niko
Other Authors: Faculty of Information Technology, Informaatioteknologian tiedekunta, Informaatioteknologia, Information Technology, Maanpuolustuskorkeakoulu, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:fin
Published: 2023
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/86282
_version_ 1826225739014340608
author Norilo, Niko
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Informaatioteknologia Information Technology Maanpuolustuskorkeakoulu University of Jyväskylä Jyväskylän yliopisto
author_facet Norilo, Niko Faculty of Information Technology Informaatioteknologian tiedekunta Informaatioteknologia Information Technology Maanpuolustuskorkeakoulu University of Jyväskylä Jyväskylän yliopisto Norilo, Niko Faculty of Information Technology Informaatioteknologian tiedekunta Informaatioteknologia Information Technology Maanpuolustuskorkeakoulu University of Jyväskylä Jyväskylän yliopisto
author_sort Norilo, Niko
datasource_str_mv jyx
description Kahden pääaineen yhteisessä pro gradu -tutkielmassa tarkasteltiin taistelualusta merellisessä kybertoimintaympäristössä. Tutkimusongelmana tarkasteltiin, miten merenkulkualan yleisimmät kyberuhkat voisivat vaikuttaa taistelualuksen taistelujärjestelmään. Tarkastelua varten mallinnettiin geneerinen Itämerellä toimiva taistelualus ja aluksen digitaalisten järjestelmien verkkorakenne. Merenkulkualan yleisimmistä kyberuhkista luotiin kolme uhkaskenaariota, joita analysoitiin muodostetun alusmallin kontekstissa. Tutkielma perustuu laajaan triangulaatiolla koottuun lähdemateriaaliin. Lähdemateriaalin ensisijaisena tavoitteena oli mahdollistaa tutkielman toteuttaminen avoimessa tietoturvaluokassa, mikä on poikkeuksellista käsiteltäessä taistelualusten kyberturvallisuutta. Tutkielman keskeisimpiä lähdetyyppejä ovat akateemiset artikkelit, merenkulkualan julkaisut, sotilasaikakauslehtien artikkelit ja tuotevalmistajien julkaisut. Lähdemateriaali käsiteltiin ensin teemoittelemalla. Tämän jälkeen materiaalia tarkasteltiin ja syvennettiin useiden syklisten työskentelyvaiheiden kautta, joissa hyödynnettiin tutkimusstrategiaksi valitulle hermeneutiikalle ominaista hermeneuttista kehää. Tutkielman johtopäätöksenä todetaan, että merenkulkualan yleiset kyberuhkat muodostavat riskin myös taistelualuksen taistelujärjestelmälle. Todennäköisin hyökkäysvektori taistelujärjestelmään kohdistuu aluksen muista digitaalisista järjestelmistä. Muita hyökkäysvektoreita ei myöskään voida poissulkea, mutta niiden analysointi edellyttäisi turvaluokitukseltaan rajoitetumman tiedon käyttöä. Muodostetut alus- ja verkkorakennemallit perustuvat vahvoihin lähteisiin, ja niiden avulla voidaan simuloida erilaisia uhkaskenaarioita. Lisäksi avoin tietoturvaluokitus luo malleille erityisen korkean käytettävyysasteen. Mallit edustavat tutkielman tuottamaa uutta tietoa. Lisäksi tutkielmaan on koostettu merkittävä määrän avoimen tietoturvaluokan tietoa kyberturvallisuudesta merellisessä toimintaympäristössä. Tutkielman tietosisältö soveltuu jatkokäytettäväksi esimerkiksi taistelualusten kyberturvallisuuskoulutuksessa, tai avoimessa tietoturvaluokassa toteutettavan jatkotutkimuksen tai analyysin perustana. The following study has been performed as a joint thesis for two majors. The purpose of the study is to examine a naval ship in a maritime cyber environment. The research problem is to determine how the most widespread cyber threats in the maritime industry might affect the combat system of the naval vessel. Three threat scenarios were created based on the identified cyber threats. Also, a typical naval vessel operating in the Baltic Sea was modeled including its digital infrastructure. Finally, the threat scenarios were analyzed in the context of the created model. A large amount of published literature was collected by the means of triangulation as the basis of the study. The most important types of literature for the thesis were identified as academic articles, publications by maritime industry organizations, articles in military journals, and publications by product manufacturers. The sources allowed the study to be conducted without the need for security classification. Due to its sensitive nature, cyber security of naval ships has seldomly been studied in unrestricted publications. First, findings from the material were categorized by themes relevant for the thesis. Afterwards the categorized findings were studied by multiple cycles of work. Simultaneously more sources were collected to deepen the researcher’s understanding. This cyclic working regimen was based on the hermeneutic cycle of the chosen research method, hermeneutics. The analysis of the threat scenarios against the created model suggests that the common cyber threats among the maritime industry pose a risk to the combat system of a naval vessel. The most likely attack vector against the combat system is created by the other digital systems of the vessel. In addition, attack vectors from within the combat system cannot be excluded. However, the analysis of these vectors would most likely require a classified study. In addition to the presented conclusion, the thesis presents models of a naval vessel and its digital infrastructure. These models are based on contemporary sources, and can be used to simulate various threat scenarios. Thus, the models represent new information created in the thesis. Furthermore, the thesis contains significant amount of information on maritime cyber environment that can be applied, for example, in crew cyber security training, or as a basis for further research or analysis.
first_indexed 2023-04-06T20:00:33Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Halunen, Kimmo", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Norilo, Niko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-04-06T06:13:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-04-06T06:13:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/86282", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kahden p\u00e4\u00e4aineen yhteisess\u00e4 pro gradu -tutkielmassa tarkasteltiin taistelualusta merellisess\u00e4 kybertoimintaymp\u00e4rist\u00f6ss\u00e4. Tutkimusongelmana tarkasteltiin, miten merenkulkualan yleisimm\u00e4t kyberuhkat voisivat vaikuttaa taistelualuksen taisteluj\u00e4rjestelm\u00e4\u00e4n. Tarkastelua varten mallinnettiin geneerinen It\u00e4merell\u00e4 toimiva taistelualus ja aluksen digitaalisten j\u00e4rjestelmien verkkorakenne. Merenkulkualan yleisimmist\u00e4 kyberuhkista luotiin kolme uhkaskenaariota, joita analysoitiin muodostetun alusmallin kontekstissa. \r\n\r\nTutkielma perustuu laajaan triangulaatiolla koottuun l\u00e4hdemateriaaliin. L\u00e4hdemateriaalin ensisijaisena tavoitteena oli mahdollistaa tutkielman toteuttaminen avoimessa tietoturvaluokassa, mik\u00e4 on poikkeuksellista k\u00e4sitelt\u00e4ess\u00e4 taistelualusten kyberturvallisuutta. Tutkielman keskeisimpi\u00e4 l\u00e4hdetyyppej\u00e4 ovat akateemiset artikkelit, merenkulkualan julkaisut, sotilasaikakauslehtien artikkelit ja tuotevalmistajien julkaisut. L\u00e4hdemateriaali k\u00e4siteltiin ensin teemoittelemalla. T\u00e4m\u00e4n j\u00e4lkeen materiaalia tarkasteltiin ja syvennettiin useiden syklisten ty\u00f6skentelyvaiheiden kautta, joissa hy\u00f6dynnettiin tutkimusstrategiaksi valitulle hermeneutiikalle ominaista hermeneuttista keh\u00e4\u00e4. \r\n\r\nTutkielman johtop\u00e4\u00e4t\u00f6ksen\u00e4 todetaan, ett\u00e4 merenkulkualan yleiset kyberuhkat muodostavat riskin my\u00f6s taistelualuksen taisteluj\u00e4rjestelm\u00e4lle. Todenn\u00e4k\u00f6isin hy\u00f6kk\u00e4ysvektori taisteluj\u00e4rjestelm\u00e4\u00e4n kohdistuu aluksen muista digitaalisista j\u00e4rjestelmist\u00e4. Muita hy\u00f6kk\u00e4ysvektoreita ei my\u00f6sk\u00e4\u00e4n voida poissulkea, mutta niiden analysointi edellytt\u00e4isi turvaluokitukseltaan rajoitetumman tiedon k\u00e4ytt\u00f6\u00e4. \r\n\r\nMuodostetut alus- ja verkkorakennemallit perustuvat vahvoihin l\u00e4hteisiin, ja niiden avulla voidaan simuloida erilaisia uhkaskenaarioita. Lis\u00e4ksi avoin tietoturvaluokitus luo malleille erityisen korkean k\u00e4ytett\u00e4vyysasteen. Mallit edustavat tutkielman tuottamaa uutta tietoa. Lis\u00e4ksi tutkielmaan on koostettu merkitt\u00e4v\u00e4 m\u00e4\u00e4r\u00e4n avoimen tietoturvaluokan tietoa kyberturvallisuudesta merellisess\u00e4 toimintaymp\u00e4rist\u00f6ss\u00e4. Tutkielman tietosis\u00e4lt\u00f6 soveltuu jatkok\u00e4ytett\u00e4v\u00e4ksi esimerkiksi taistelualusten kyberturvallisuuskoulutuksessa, tai avoimessa tietoturvaluokassa toteutettavan jatkotutkimuksen tai analyysin perustana.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The following study has been performed as a joint thesis for two majors. The purpose of the study is to examine a naval ship in a maritime cyber environment. The research problem is to determine how the most widespread cyber threats in the maritime industry might affect the combat system of the naval vessel. Three threat scenarios were created based on the identified cyber threats. Also, a typical naval vessel operating in the Baltic Sea was modeled including its digital infrastructure. Finally, the threat scenarios were analyzed in the context of the created model.\r\n\r\nA large amount of published literature was collected by the means of triangulation as the basis of the study. The most important types of literature for the thesis were identified as academic articles, publications by maritime industry organizations, articles in military journals, and publications by product manufacturers. The sources allowed the study to be conducted without the need for security classification. Due to its sensitive nature, cyber security of naval ships has seldomly been studied in unrestricted publications. First, findings from the material were categorized by themes relevant for the thesis. Afterwards the categorized findings were studied by multiple cycles of work. Simultaneously more sources were collected to deepen the researcher\u2019s understanding. This cyclic working regimen was based on the hermeneutic cycle of the chosen research method, hermeneutics.\r\n\r\nThe analysis of the threat scenarios against the created model suggests that the common cyber threats among the maritime industry pose a risk to the combat system of a naval vessel. The most likely attack vector against the combat system is created by the other digital systems of the vessel. In addition, attack vectors from within the combat system cannot be excluded. However, the analysis of these vectors would most likely require a classified study. \r\n\r\nIn addition to the presented conclusion, the thesis presents models of a naval vessel and its digital infrastructure. These models are based on contemporary sources, and can be used to simulate various threat scenarios. Thus, the models represent new information created in the thesis. Furthermore, the thesis contains significant amount of information on maritime cyber environment that can be applied, for example, in crew cyber security training, or as a basis for further research or analysis.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-04-06T06:13:03Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-04-06T06:13:03Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "122", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "taistelualus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "taisteluj\u00e4rjestelm\u00e4", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202304062413", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Maanpuolustuskorkeakoulu", "language": null, "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "digitalisaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_86282
language fin
last_indexed 2025-02-18T10:54:52Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Norilo, Niko Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen taistelualus taistelujärjestelmä kyberuhka Cyber Security Kyberturvallisuus 601 digitalisaatio kyberturvallisuus
title Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
title_full Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
title_fullStr Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
title_full_unstemmed Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
title_short Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
title_sort taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
title_txtP Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
topic taistelualus taistelujärjestelmä kyberuhka Cyber Security Kyberturvallisuus 601 digitalisaatio kyberturvallisuus
topic_facet 601 Cyber Security Kyberturvallisuus digitalisaatio kyberturvallisuus kyberuhka taistelualus taistelujärjestelmä
url https://jyx.jyu.fi/handle/123456789/86282 http://www.urn.fi/URN:NBN:fi:jyu-202304062413
work_keys_str_mv AT noriloniko taistelualuksenjasiihenkohdistuvienkyberuhkienmallintaminen