fullrecord |
[{"key": "dc.contributor.advisor", "value": "Saastamoinen, Anna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jormakka, Tomi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-10-27T07:17:42Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-10-27T07:17:42Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/90856", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor's thesis delves into the ten most common risks in web application \r\ndevelopment, based on the OWASP (Open Web Application Security Project) \r\nTop 10 list available on their website. The thesis aims to address the question of \r\nwhether the OWASP Top 10 list is sufficient when discussing cybersecurity in \r\nweb application development. OWASP is one of the most well-known international communities in the field of cybersecurity, with a mission to enhance safer \r\nweb application development practices. The thesis employs a descriptive literature review methodology. The sources for the thesis have been gathered from \r\nthe following databases: the Association for Computing Machinery and Google \r\nScholar. The findings indicate that the OWASP Top 10 list serves as a solid \r\nfoundation for cybersecurity in web application development. However, it is \r\nacknowledged that the Top 10 list does not cover all aspects of cybersecurity in\r\nweb application development, as the field continues to evolve along with its \r\ntechnologies and trends. Therefore, adopting a model of continuous learning is \r\nrecommended for those engaged in web application development.", "language": "eng", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kandidaatintutkielmassa perehdyt\u00e4\u00e4n kymmeneen yleisimp\u00e4\u00e4n verkkosovelluskehityksen riskiin pohjautuen OWASP verkkosivuilta l\u00f6ytyv\u00e4\u00e4n top 10 \r\nlistaan. Tutkielma pyrkii vastaamaan kysymykseen, onko OWASP top 10 -lista \r\nriitt\u00e4v\u00e4 puhuttaessa kyberturvallisesta verkkosovelluskehityksest\u00e4. OWASP\r\n(Open Worldwide Application Security Project) on kyberturvallisuuden alalla\r\nyksi tunnetuimpia kansainv\u00e4lisi\u00e4 yhteis\u00f6j\u00e4, jonka tarkoituksena on kehitt\u00e4\u00e4\r\nturvallisempaa verkkosovelluskehityst\u00e4. Tutkielma toteutetaan kuvailevana \r\nkirjallisuuskatsauksena. Tutkielman l\u00e4hteet ovat ker\u00e4tty seuraavista tietokannoista: Association for Computing Machinery ja Google Scholar. Tulokset osoittavat, ett\u00e4 OWASP top 10 -lista on hyv\u00e4 l\u00e4ht\u00f6kohta kyberturvalliselle verkkosovelluskehitykselle. Kuitenkaan top 10 -lista ei kata kaikkia n\u00e4k\u00f6kulmia kyberturvallisessa verkkosovelluskehityksess\u00e4. Lis\u00e4ksi alan teknologia ja trendit kehittyv\u00e4t, joten on suositeltavaa noudattaa jatkuvan oppimisen mallia verkkosovelluskehityksess\u00e4.", "language": "fin", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-10-27T07:17:42Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-10-27T07:17:42Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "OWASP Top 10 -listan riitt\u00e4vyys kyberturvallisessa verkkosovelluskehityksess\u00e4", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202310276883", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kehitt\u00e4minen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|