fullrecord |
[{"key": "dc.contributor.advisor", "value": "Riekkinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "R\u00f6nkk\u00f6, Veikka", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-06-16T06:28:57Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-06-16T06:28:57Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87851", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Valtioiden sis\u00e4isten palveluiden ja kriittisten infrastruktuurin digitalisoituessa niihin kohdistuu entist\u00e4 vahvemmin kybersodank\u00e4ynnin uhkat. Ukrainan sota on osoittanut, ett\u00e4 kyberhy\u00f6kk\u00e4yksill\u00e4 on todellisen maailman vaikutuksia ja valtioiden on varauduttava niihin. Kybersodank\u00e4ynnin uhkat ovat hyvin samanlaiset kuin mit\u00e4 organisaatiot ja yritykset kokevat, mutta niiden aiheuttamat vauriot voivat ylitt\u00e4\u00e4 valtameri\u00e4. Kyberuhkatiedustelussa organisaatiot ja yritykset ker\u00e4\u00e4v\u00e4t ja jakavat kyberuhkadataa, -informaatiota ja -tietoa toistensa kanssa ennaltaehk\u00e4ist\u00e4kseen uhkia ja v\u00e4hent\u00e4\u00e4kseen niiden aiheuttamaa vahinkoa. T\u00e4m\u00e4n kandidaatintutkielman tarkoituksena oli kirjallisuuskatsauksella aiheeseen tutkia, kuinka unionit ja valtiot hy\u00f6dynt\u00e4v\u00e4t kyberuhkatiedustelun toimintatapoja vahventaakseen omaa kyberresilienssi\u00e4\u00e4n. Tiedon jakamista tuetaan useiden eri yhteisty\u00f6organisaatioiden kautta, jotka tukevat tiedon vaihtoa niin yksityisten kuin valtioiden organisaatioidenkin v\u00e4lill\u00e4. Kyberuhkien ennaltaehk\u00e4isy\u00e4 toteutetaan direktiivein, lains\u00e4\u00e4d\u00e4nn\u00f6in ja s\u00e4\u00e4d\u00f6sten avulla. Esimerkiksi Euroopan unioni uusi sen NIS-direktiivins\u00e4 toiseen versioon vuonna 2023, joka pakottaa sen j\u00e4senvaltiot perustamaan omat tiedonvaihtoyhteisty\u00f6organisaationsa. EU:lla on my\u00f6s tulevaisuudessa tuloillaan kyberkest\u00e4vyyss\u00e4\u00e4d\u00f6s digitaalisia elementtej\u00e4 sis\u00e4lt\u00e4vien tuotteiden ja palveluiden tietoturvallisuudesta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Digitalization of services and critical infrastructure has exposed them to the threats of cyberwarfare. The war in Ukraine has shown that cyber-attacks have a real-world impact and nation-states must be prepared to face them. In cyber threat intelligence, organizations collect and share cyber threat information with each other to prevent threats and to reduce the damage caused by them. Cyber threats of cyber warfare are very similar to what organizations experience, but the damage they cause can be multicontinental. The aim of this bachelors\u2019 thesis was as a literary review to study how unions and nation-states use the practices of cyber threat intelligence to strengthen their own cyber resilience. The information sharing is supported through several different cooperative organizations that support the exchange of information between both private and state organizations. The cyber threat prevention is supported and implemented through acts, directives, and legislation. For example, the European Union renewed their NIS directive in 2023, which forces its member states to establish their own information exchange cooperation organizations. The EU also has cyber resilience act on the way that regulates the cybersecurity of products and services with digital elements.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-06-16T06:28:57Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-06-16T06:28:57Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "33", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhkatiedustelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberuhkatiedustelun hy\u00f6dynt\u00e4minen kybersodank\u00e4ynnin uhkia vastaan", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202306163906", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedustelu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|