fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Halunen, Kimmo", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Norilo, Niko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-04-06T06:13:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-04-06T06:13:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/86282", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kahden p\u00e4\u00e4aineen yhteisess\u00e4 pro gradu -tutkielmassa tarkasteltiin taistelualusta merellisess\u00e4 kybertoimintaymp\u00e4rist\u00f6ss\u00e4. Tutkimusongelmana tarkasteltiin, miten merenkulkualan yleisimm\u00e4t kyberuhkat voisivat vaikuttaa taistelualuksen taisteluj\u00e4rjestelm\u00e4\u00e4n. Tarkastelua varten mallinnettiin geneerinen It\u00e4merell\u00e4 toimiva taistelualus ja aluksen digitaalisten j\u00e4rjestelmien verkkorakenne. Merenkulkualan yleisimmist\u00e4 kyberuhkista luotiin kolme uhkaskenaariota, joita analysoitiin muodostetun alusmallin kontekstissa. \r\n\r\nTutkielma perustuu laajaan triangulaatiolla koottuun l\u00e4hdemateriaaliin. L\u00e4hdemateriaalin ensisijaisena tavoitteena oli mahdollistaa tutkielman toteuttaminen avoimessa tietoturvaluokassa, mik\u00e4 on poikkeuksellista k\u00e4sitelt\u00e4ess\u00e4 taistelualusten kyberturvallisuutta. Tutkielman keskeisimpi\u00e4 l\u00e4hdetyyppej\u00e4 ovat akateemiset artikkelit, merenkulkualan julkaisut, sotilasaikakauslehtien artikkelit ja tuotevalmistajien julkaisut. L\u00e4hdemateriaali k\u00e4siteltiin ensin teemoittelemalla. T\u00e4m\u00e4n j\u00e4lkeen materiaalia tarkasteltiin ja syvennettiin useiden syklisten ty\u00f6skentelyvaiheiden kautta, joissa hy\u00f6dynnettiin tutkimusstrategiaksi valitulle hermeneutiikalle ominaista hermeneuttista keh\u00e4\u00e4. \r\n\r\nTutkielman johtop\u00e4\u00e4t\u00f6ksen\u00e4 todetaan, ett\u00e4 merenkulkualan yleiset kyberuhkat muodostavat riskin my\u00f6s taistelualuksen taisteluj\u00e4rjestelm\u00e4lle. Todenn\u00e4k\u00f6isin hy\u00f6kk\u00e4ysvektori taisteluj\u00e4rjestelm\u00e4\u00e4n kohdistuu aluksen muista digitaalisista j\u00e4rjestelmist\u00e4. Muita hy\u00f6kk\u00e4ysvektoreita ei my\u00f6sk\u00e4\u00e4n voida poissulkea, mutta niiden analysointi edellytt\u00e4isi turvaluokitukseltaan rajoitetumman tiedon k\u00e4ytt\u00f6\u00e4. \r\n\r\nMuodostetut alus- ja verkkorakennemallit perustuvat vahvoihin l\u00e4hteisiin, ja niiden avulla voidaan simuloida erilaisia uhkaskenaarioita. Lis\u00e4ksi avoin tietoturvaluokitus luo malleille erityisen korkean k\u00e4ytett\u00e4vyysasteen. Mallit edustavat tutkielman tuottamaa uutta tietoa. Lis\u00e4ksi tutkielmaan on koostettu merkitt\u00e4v\u00e4 m\u00e4\u00e4r\u00e4n avoimen tietoturvaluokan tietoa kyberturvallisuudesta merellisess\u00e4 toimintaymp\u00e4rist\u00f6ss\u00e4. Tutkielman tietosis\u00e4lt\u00f6 soveltuu jatkok\u00e4ytett\u00e4v\u00e4ksi esimerkiksi taistelualusten kyberturvallisuuskoulutuksessa, tai avoimessa tietoturvaluokassa toteutettavan jatkotutkimuksen tai analyysin perustana.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The following study has been performed as a joint thesis for two majors. The purpose of the study is to examine a naval ship in a maritime cyber environment. The research problem is to determine how the most widespread cyber threats in the maritime industry might affect the combat system of the naval vessel. Three threat scenarios were created based on the identified cyber threats. Also, a typical naval vessel operating in the Baltic Sea was modeled including its digital infrastructure. Finally, the threat scenarios were analyzed in the context of the created model.\r\n\r\nA large amount of published literature was collected by the means of triangulation as the basis of the study. The most important types of literature for the thesis were identified as academic articles, publications by maritime industry organizations, articles in military journals, and publications by product manufacturers. The sources allowed the study to be conducted without the need for security classification. Due to its sensitive nature, cyber security of naval ships has seldomly been studied in unrestricted publications. First, findings from the material were categorized by themes relevant for the thesis. Afterwards the categorized findings were studied by multiple cycles of work. Simultaneously more sources were collected to deepen the researcher\u2019s understanding. This cyclic working regimen was based on the hermeneutic cycle of the chosen research method, hermeneutics.\r\n\r\nThe analysis of the threat scenarios against the created model suggests that the common cyber threats among the maritime industry pose a risk to the combat system of a naval vessel. The most likely attack vector against the combat system is created by the other digital systems of the vessel. In addition, attack vectors from within the combat system cannot be excluded. However, the analysis of these vectors would most likely require a classified study. \r\n\r\nIn addition to the presented conclusion, the thesis presents models of a naval vessel and its digital infrastructure. These models are based on contemporary sources, and can be used to simulate various threat scenarios. Thus, the models represent new information created in the thesis. Furthermore, the thesis contains significant amount of information on maritime cyber environment that can be applied, for example, in crew cyber security training, or as a basis for further research or analysis.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-04-06T06:13:03Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-04-06T06:13:03Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "122", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "taistelualus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "taisteluj\u00e4rjestelm\u00e4", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202304062413", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Maanpuolustuskorkeakoulu", "language": null, "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "digitalisaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|