fullrecord |
[{"key": "dc.contributor.advisor", "value": "Saastamoinen, Anna", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Monto, Tuukka", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-06-15T05:41:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-06-15T05:41:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87773", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "L\u00e4hes kaikki liiketoiminta organisaatioissa tapahtuu k\u00e4ytt\u00e4m\u00e4ll\u00e4 erilaisia tietoj\u00e4rjestelmi\u00e4. J\u00e4rjestelmiin on tallennettuna organisaatioon ja sen toimintaan liittyvi\u00e4 tietoja, joita pyrit\u00e4\u00e4n suojelemaan hyv\u00e4n tietoturvan avulla. T\u00e4ss\u00e4 tutkielmassa k\u00e4sitell\u00e4\u00e4n eettisen hakkeroinnin hy\u00f6dynt\u00e4mist\u00e4 organisaation tietoj\u00e4rjestelm\u00e4n tietoturvan kehityksess\u00e4, ja mit\u00e4 hy\u00f6tyj\u00e4 ja haasteita siihen liittyy. Eettinen hakkerointi on tietoj\u00e4rjestelm\u00e4n omistajan luvalla tapahtuvaa tietoj\u00e4rjestelm\u00e4\u00e4n tunkeutumista, jonka tarkoituksena on parantaa kyseisen j\u00e4rjestelm\u00e4n tietoturvaa tunkeutumisen aikana tehtyjen havaintojen ja niiden perusteella laaditun raportin avulla. Eettinen hakkerointi eroaa rikollisesta hakkeroinnista siten, ett\u00e4 j\u00e4rjestelm\u00e4\u00e4n tunkeutumiseen on lupa ja tunkeutumisen tarkoitus on kehitt\u00e4\u00e4 tietoturvaa. Oikein k\u00e4ytettyn\u00e4 eettinen hakkerointi on tehokas ty\u00f6kalu havaitsemaan organisaation tietoj\u00e4rjestelmien tietoturvan heikkoja kohtia j\u00e4rjestelm\u00e4n teknisest\u00e4 toteutuksesta, kuten my\u00f6s sen k\u00e4ytt\u00e4misest\u00e4 ja k\u00e4ytt\u00e4jien toimintatavoista. Havaittuihin tietoturvan heikkoihin kohtiin esitet\u00e4\u00e4n parannusehdotuksia eettisen hakkeroinnin lopuksi laadittavassa raportissa. Eettisen hakkeroinnin hy\u00f6dynt\u00e4miseen liittyy my\u00f6s haasteita, joista organisaatioiden tulisi olla tietoisia ennen eettisen hakkeroinnin hy\u00f6dynt\u00e4mist\u00e4 prosesseissaan. Tutkielma on toteutettu kuvailevana kirjallisuuskatsauksena.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-06-15T05:41:23Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-06-15T05:41:23Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Eettisen hakkeroinnin vaikutukset tietoj\u00e4rjestelm\u00e4n tietoturvan kehityksess\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202306153834", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|