fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pohjankoski, Merja", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-06-14T10:02:20Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-06-14T10:02:20Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87757", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkimusty\u00f6n tarkoitus oli tutkia p\u00e4\u00e4asiassa Ukrainaan vuoden 2022 aikana kohdistuneita kyberhy\u00f6kk\u00e4yksi\u00e4, sek\u00e4 valaista hiukan my\u00f6s Ven\u00e4j\u00e4n muihin l\u00e4ntisiin naapureihin (Suomi, Viro, Latvia, Liettua ja Puola) kohdistuneita kyberhy\u00f6kk\u00e4yksi\u00e4. Ty\u00f6 toteutettiin laadullisena sis\u00e4lt\u00f6analyysin\u00e4, jossa tiedon-keruumenetelm\u00e4n\u00e4 oli julkaistu tietoaineisto. Asia kiinnosti tutkijaa ajankohtaisuutensa vuoksi. P\u00e4\u00e4tutkimuskysymyksen\u00e4 oli \u201dMit\u00e4 voimme p\u00e4\u00e4tell\u00e4 vuoden 2022 kyberhy\u00f6kk\u00e4yksist\u00e4 Ukrainaan\u201d. T\u00e4lle p\u00e4\u00e4tutkimuskysymykselle on laadittu kolme alatutkimuskysymyst\u00e4:\n1. Millaisia Ukrainaan kohdistuneita, vuoden 2022 aikana tehtyj\u00e4 kyberhy\u00f6kk\u00e4yksi\u00e4 on l\u00f6ydetty? Millaisia hy\u00f6kk\u00e4yksi\u00e4 Suomeen (sek\u00e4 Baltian maihin ja Puolaan) on tehty vuonna 2022?\n2. Miten hy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4, hy\u00f6kk\u00e4ystyypit ja hy\u00f6kk\u00e4ysten kohteet ovat muuttuneet vuoden aikana?\n3. Onko havaittavissa mit\u00e4\u00e4n trendi\u00e4, ja voidaanko tuloksista p\u00e4\u00e4tell\u00e4 tai ennakoida tulevaa? \nTy\u00f6ss\u00e4 taustoitettiin kybermaailman lainalaisuuksia ja terminologiaa sek\u00e4 kuvattiin lyhyesti vuoden 2022 Ven\u00e4j\u00e4n Ukrainan vastaisen sotilaallisen suur-hy\u00f6kk\u00e4yksen t\u00e4rkeimm\u00e4t tapahtumat. Selkeyden vuoksi kuvattiin lyhyesti t\u00e4rkeimm\u00e4t tapahtumat ja merkitt\u00e4vimm\u00e4t kyberhy\u00f6kk\u00e4ykset my\u00f6s Krimin valtauksesta (2014) Ven\u00e4j\u00e4n tekem\u00e4\u00e4n sotilaallisen hy\u00f6kk\u00e4yksen alkamiseen (helmikuu 2022). T\u00e4m\u00e4 n\u00e4htiin tarpeelliseksi, jotta voitiin tutkia my\u00f6s kybertapahtumien muuttumista sotilaallisen suurhy\u00f6kk\u00e4yksen l\u00e4hestyess\u00e4 ja sen alettua. Ty\u00f6n ja tutkimuskysymysten rajaus muuttui viel\u00e4 ty\u00f6n edetess\u00e4. Ty\u00f6n tuloksena selvisi, ett\u00e4 kyberhy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 lis\u00e4\u00e4ntyi voimakkaasti sek\u00e4 Ukrainassa ett\u00e4 muissa Ven\u00e4j\u00e4n l\u00e4ntisiss\u00e4 naapurimaissa, mutta hiukan eri tahdissa. Suurhy\u00f6kk\u00e4yksen j\u00e4lkeen Ukrainaa vastaan kohdistetut hy\u00f6kk\u00e4ykset muuttuivat aggressiivisimmiksi. Hy\u00f6kk\u00e4ystyypit vaihtelivat kohteen mukaan: Ukrainaa vastaan vuonna 2022 k\u00e4ytettiin p\u00e4\u00e4asiassa erityisen haitallisia, tietoa tuhoavia niin kutsuttuja wiper-hy\u00f6kk\u00e4yksi\u00e4, kun taas Ukrainaa tukeviin, Ven\u00e4j\u00e4n muihin l\u00e4ntisiin naapurimaihin iskettiin erityisesti palvelunestohy\u00f6kk\u00e4yksill\u00e4. Ukrainan nopea vastatoiminta ja kansainv\u00e4lisen yhteis\u00f6n tuki yll\u00e4ttiv\u00e4t hy\u00f6kk\u00e4\u00e4j\u00e4ksi ilmenneen Ven\u00e4j\u00e4n, eiv\u00e4tk\u00e4 hy\u00f6kk\u00e4ykset lopulta tuottaneet toivottua tulosta. On kyetty osoittamaan, ett\u00e4 Ukrainassa kyberhy\u00f6kk\u00e4yksill\u00e4 ja kineettisill\u00e4 sotatoimilla on selke\u00e4 korrelaatio.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The aim of this master\u2019s thesis work was to study cyber-attacks made during 2022 against Ukraine, and also take a quick look on attacks made against other western neighbor countries of Russia (Finland, Estonia, Latvia, Lithuania and Poland). The study was implemented as a qualitative content analysis, with the data collection method being public published information. The topic of the study was chosen because the phenomena to be studied were very topical in this particular point of time. The main research question was \u201cWhat conclusions can be made concerning cyber-attacks towards Ukraine in 2022\u201d. To support this main question three other sub questions were drafted:\n1. What kind of cyber-attacks against Ukraine were found, made during 2022? What kind of attacks against Finland, the Baltic states and Poland were found?\n2. How have the amounts, types, and targets of changed during 2022? \n3. Can any trends be seen? Is it possible to forecast anything for the future based on the results?\n\nThe basic principles and terminology of the cyber world were first introduced. Also, the most significant happenings of Russia\u2019s major military invasion (Feb-ruary 2022) were briefly described. For clarity also the main happenings and the most remarkable cyber-attacks between the illegal annexation of Crimea (2014) and the Russian military attack were described. This was seen important to be able to compare the attacks before and after the major military attack. The definitions and delimitations of the main research questions of the study changed as the work advanced. As a result of the study, it was found out that the amount of cyber-attacks increased remarkably both in Ukraine and Russia\u2019s other western neighbours, but in a different pace. Also, after the major military attack the cyber-attacks against Ukraine started to be more aggressive. The attack types varied depending on the target countries: the attacks against Ukraine were made using disastrous malware (so called wipers), as the other countries were attacked mainly with denial-of-service attacks. Ukraine\u2019s fast counter activities and the wide international support surprised Russia, who was found to be behind the cyber-attacks. The attacks did not bring the success the attacker had wished. Evidence has been found to prove the correlation between physical military operations and cyber-attacks in Ukraine.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-06-14T10:02:20Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-06-14T10:02:20Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "68", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertoimintaymp\u00e4rist\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberoperaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberhy\u00f6kk\u00e4yksist\u00e4 Ukrainassa 2022", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202306143822", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "attribuutio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|