fullrecord |
[{"key": "dc.contributor.advisor", "value": "Riekkinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "M\u00e4\u00e4tt\u00e4, Eemil", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-06-30T07:39:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-06-30T07:39:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/88147", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teko\u00e4ly on kehittynyt todella monella alalla, ja sen luomat mahdollisuudet kyberpuolustuksessa ovat jatkuvassa kasvussa. T\u00e4ss\u00e4 tutkielmassa k\u00e4siteltiin teko\u00e4ly\u00e4 ja sen hy\u00f6dynt\u00e4mist\u00e4 kyberpuolustuksen n\u00e4k\u00f6kulmasta. Tutkielmassa perehdyttiin mahdollisuuksiin, joita teko\u00e4ly tarjoaa kyberpuolustukseen. Tutkielma toteutettiin kirjallisuuskatsauksena. Kirjallisuuskatsauksen tiedonkeruussa hy\u00f6dynnettiin erilaisia tietokantoja, joista l\u00f6ydettiin tutkimusartikkeleita ja muuta tutkimuskirjallisuutta. Tutkielma pyrki vastaamaan tutkimuksen kahteen p\u00e4\u00e4kysymykseen: \u201dMik\u00e4 on teko\u00e4lyn rooli kyberpuolustuksessa?\u201d ja \u201dMiten teko\u00e4ly\u00e4 voidaan hy\u00f6dynt\u00e4\u00e4 tulevaisuuden kyberpuolustuksessa?\u201d Tutkielmassa esitettiin ensin teko\u00e4lyn ja kyberpuolustuksen m\u00e4\u00e4ritelm\u00e4t, joiden j\u00e4lkeen pureuduttiin niiden yhteensovittamiseen. Kirjallisuuskatsauksen johtop\u00e4\u00e4t\u00f6ksen\u00e4 voidaan todeta, ett\u00e4 teko\u00e4lyn hy\u00f6dynt\u00e4minen kyberpuolustuksessa on eritt\u00e4in merkityksellist\u00e4 ja sen potentiaali puolustuksen vahvistajana on huomattava. Tutkielman perusteella teko\u00e4ly\u00e4 hy\u00f6dynnet\u00e4\u00e4n puolustuksessa jo jossain m\u00e4\u00e4rin, mutta tulevaisuudessa sen merkitys kasvaa entisest\u00e4\u00e4n hy\u00f6kk\u00e4ysten kehittyess\u00e4 teko\u00e4lyn my\u00f6t\u00e4 yh\u00e4 edistyksellisemmiksi. Tutkielmassa esitettiin sek\u00e4 teko\u00e4lyn rooli nykyajan kyberpuolustuksessa ett\u00e4 teko\u00e4lyn mahdollisuuksia tulevaisuuden kyberpuolustuksessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Artificial intelligence has advanced in numerous fields, and the opportunities it creates in cyber defense are continuously increasing. This Bachelor\u2019s thesis discussed artificial intelligence and its utilization from the perspective of cyber defense. The thesis examined the possibilities that artificial intelligence offers for cyber defense. The study was conducted as a literature review, utilizing various databases to find research articles and other relevant literature. The thesis aimed to answer two main research questions: \"What is the role of artificial intelligence in cyber defense?\" and \"How can artificial intelligence be utilized in future cyber defense?\" First, definitions of AI and cyber defense were presented, followed by a discussion of their compatibility. As a conclusion of the literature review, it can be stated that the utilization of artificial intelligence in cyber defense is highly significant and its potential as a defense enhancer is considerable. Based on the thesis, artificial intelligence is already being used to some extent in defense, but its importance will grow even further in the future as attacks become increasingly advanced with the help of artificial intelligence. The thesis presented both the role of artificial intelligence in current cyber defense and its possibilities in future cyber defense.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-06-30T07:39:23Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-06-30T07:39:23Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "36", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberpuolustus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberpuolustusmenetelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4ly kyberpuolustuksessa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202306304293", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "puolustus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|