fullrecord |
[{"key": "dc.contributor.advisor", "value": "Vuorinen, Jukka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sippola, Jan", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-08-22T05:29:10Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-08-22T05:29:10Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/88614", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nopea teknologian kehitys on saanut ihmiset ja yhteiskunnat riippuvaisemmiksi entist\u00e4 monimutkaisemmista j\u00e4rjestelmist\u00e4 ja yh\u00e4 useampi yritys ja organisaatio k\u00e4ytt\u00e4\u00e4kin laajasti tietotekniikkaa eri toiminnoissaan. T\u00e4m\u00e4 kehitys on tuonut mukanaan lis\u00e4\u00e4ntyneet, entist\u00e4 monimutkaisemmat kyberturvallisuutta koskevat uhat, joihin vastaamiseen teko\u00e4lyst\u00e4 on haettu apua. T\u00e4m\u00e4n kandidaatintutkielman tarkoituksena oli selvitt\u00e4\u00e4 teko\u00e4lyn k\u00e4ytt\u00f6mahdollisuuksia kyberturvallisuuden parantamiseksi erityisesti jatkuvan valvonnan alueella. Tutkielma toteutettiin joidenkin menetelmien osalta systemaattista katsausta l\u00e4hestyv\u00e4n\u00e4 kuvailevana kirjallisuuskatsauksena, jossa analysoitiin monipuolisesti tutkimuksia ja artikkeleita teko\u00e4lyst\u00e4, kyberturvallisuudesta, jatkuvasta valvonnasta ja teko\u00e4lyn k\u00e4yt\u00f6st\u00e4 kyberturvallisuudessa. Teko\u00e4ly ja kyberturvallisuus ovat k\u00e4sittein\u00e4 laajoja, joten niiden m\u00e4\u00e4ritelmi\u00e4 ja niihin liittyvi\u00e4 seikkoja k\u00e4siteltiin tutkielmassa aiheen kannalta olennaisin osin. Tutkielman tulokset osoittivat, ett\u00e4 teko\u00e4lyll\u00e4 on suuri potentiaali erityisesti kyberuhkien jatkuvassa valvonnassa ja uhkien torjunnassa, vaikkakin sen k\u00e4ytt\u00f6\u00f6n liittyy my\u00f6s haasteita. Kyberymp\u00e4rist\u00f6n jatkuvassa valvonnassa teko\u00e4ly osoittautui eritt\u00e4in hy\u00f6dylliseksi, sill\u00e4 sen avulla voidaan havaita tehokkaasti esimerkiksi poikkeamia normaalista toiminnasta ja ennaltaehk\u00e4ist\u00e4 mahdollisia tulevia hy\u00f6kk\u00e4yksi\u00e4. Erilaisten teko\u00e4lysovellusten avulla voidaan vastata kehittyneisiin ja monipuolistuviin kyberuhkiin tehokkaammin kuin perinteisill\u00e4 menetelmill\u00e4. Tehokkaammat keinot kyberuhkien torjunnassa ovatkin t\u00e4rkeit\u00e4, sill\u00e4 teknologian kehityksen my\u00f6t\u00e4 my\u00f6s kyberuhat ovat entist\u00e4 kehittyneempi\u00e4 ja monimutkaisempia. Teko\u00e4ly n\u00e4ytt\u00e4\u00e4kin olevan v\u00e4ltt\u00e4m\u00e4t\u00f6n apu tulevaisuuden kyberuhkien ennaltaehk\u00e4isemisess\u00e4 ja torjumisessa, ja organisaatioilla ja yrityksill\u00e4 onkin jo nyky\u00e4\u00e4n k\u00e4yt\u00f6ss\u00e4 erilaisia teko\u00e4lysovelluksia kyberymp\u00e4rist\u00f6n jatkuvassa valvonnassa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The rapid development of technology has made people and societies increasingly dependent on more complex systems, and an increasing number of companies and organizations widely use information technology in their operations. This development has brought about increased, more complex cybersecurity threats, for which artificial intelligence (AI) has been sought as a solution. The purpose of this bachelor\u2019s thesis was to explore the potential use of AI in improving cy- bersecurity, particularly in the area of continuous monitoring. The thesis was conducted partly as a systematic review, analyzing a diverse range of research papers and articles on AI, cybersecurity, continuous monitoring, and the use of AI in cybersecurity. AI and cybersecurity are broad concepts, so the thesis ad- dressed their definitions and relevant aspects for the topic. The results of the the- sis demonstrated that AI has great potential, especially in continuous monitoring and mitigating cyber threats, although its use also presents challenges. In the con- text of continuous monitoring in the cyber environment, AI proved to be highly beneficial, as it can effectively detect anomalies in normal operations and prevent potential future attacks. Various AI applications can respond to advanced and diversified cyber threats more effectively than traditional methods. More effec- tive means of countering cyber threats are crucial, as technological advancements have led to increasingly sophisticated and complex cyber risks. AI appears to be an essential tool in preventing and combating future cyber threats, and organizations and companies already utilize various AI applications for continuous monitoring in the cyber environment.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-08-22T05:29:10Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-08-22T05:29:10Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "39", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "AI-algoritmi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "jatkuva valvonta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lyn mahdollisuudet kyberuhkien jatkuvan valvonnan ja torjunnan ty\u00f6kaluna", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202308224712", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|