fullrecord |
[{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Brostr\u00f6m, Timo", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-11-14T06:56:50Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-11-14T06:56:50Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/91912", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Alati muuttuvassa kyberuhkien ymp\u00e4rist\u00f6ss\u00e4 ennalta varautuminen erilaisiin \nkyberhy\u00f6kk\u00e4yksiin on yh\u00e4 t\u00e4rke\u00e4mp\u00e4\u00e4. Jotta hy\u00f6kk\u00e4yksiin voitaisiin ennalta varautua, tarvitaan tietoa. Uhkatieto ja sen jakaminen sidosryhmien kesken voi olla \nosa ratkaisua ennalta varautumisessa. Kun sidosryhm\u00e4n j\u00e4senet saavat ajoissa \ntiedon k\u00e4ynnistym\u00e4ss\u00e4 olevasta kyberhy\u00f6kk\u00e4yksest\u00e4, he voivat ottaa tarvittavat \nvarautumiskeinot k\u00e4ytt\u00f6\u00f6n jo ennen hy\u00f6kk\u00e4yksen alkua. T\u00e4m\u00e4 pro gradu -tutkielma tarkasteli uhkatietojen mahdollisuuksia korkeakoulujen tietoturvan kehitt\u00e4misess\u00e4. Uhkatietojen jakamiseen k\u00e4ytettiin MISP-alustaa, joka on avoimen \nl\u00e4hdekoodin sovellus uhkatietojen ker\u00e4\u00e4miseen ja jakamiseen. Tutkielman tutkimusmenetelmiksi valittiin kirjallisuuskatsaus sek\u00e4 konstruktiivinen tutkimusmenetelm\u00e4, joka etsii ratkaisua reaalimaailman ongelmiin. Tutkielman l\u00e4hteiksi \nvalittiin luotettavia, relevantteja, hyv\u00e4n tason l\u00e4hteit\u00e4. Lopputuloksena havaittiin, \nett\u00e4 MISP on varteenotettava ty\u00f6kalu uhkatietojen jakamisessa. Integraatioiden \nmuodostaminen toisiin j\u00e4rjestelmiin, tapahtumien jakaminen toisen organisaation kanssa ja uhkatietojen organisointi oli parhaimmillaan yksinkertaista ja suoraviivaista. Toisaalta havaittiin, ett\u00e4 MISP on lopulta vain ty\u00f6kalu, varasto, johon \nuhkatietoa vied\u00e4\u00e4n, eik\u00e4 se yksin ole vastaus tehokkaaseen tietojen jakamiseen ja \nhy\u00f6dynt\u00e4miseen, vaan lis\u00e4ksi tarvitaan selkeit\u00e4 prosesseja, s\u00e4\u00e4nt\u00f6j\u00e4 ja standardeja, selke\u00e4\u00e4 lains\u00e4\u00e4d\u00e4nt\u00f6\u00e4 sek\u00e4 motivoituneita ihmisi\u00e4 ty\u00f6skentelem\u00e4\u00e4n uhkatiedon ker\u00e4\u00e4misen, k\u00e4sittelemisen ja jalostamisen parissa. Lis\u00e4ksi MISP:n yll\u00e4pit\u00e4minen ja ongelmien selvittely olivat pahimmillaan reilusti aikaa vievi\u00e4 prosesseja. MISP-alustassa on potentiaalia, mutta se tarvitsee k\u00e4ytt\u00e4ji\u00e4, jotka ymm\u00e4rt\u00e4v\u00e4t sen toimintaa ja jotka ovat sitoutuneet yhteisiin pelis\u00e4\u00e4nt\u00f6ihin uhkatietojen \njakamisessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In the ever-changing environment of cyber threats, it is increasingly important to \nbe prepared in advance for various cyber-attacks. In order to prepare for attacks \nin advance, information is needed. Threat intel and its sharing among stakeholders can be part of the solution in preparing for the cyber threats in advance. When \nthe stakeholders receive timely information about a cyber-attack that is about to \nstart, they can take the necessary precautions before the attack begins. This master's thesis examined the possibilities of threat information in the development of \ninformation security in higher education institutions. The MISP platform was \nused to share threat information, which is an open-source application for collecting and sharing threat intel. The research methods chosen for the dissertation \nwere a literature review and a constructive research method that seeks solutions \nto real-world problems. Reliable, relevant, high-quality sources were chosen as \nsources for the thesis. As a result, it was found that MISP is a viable tool for sharing threat information. Creating integrations with other systems, sharing events \nwith another organization, and organizing threat information was simple and \nstraightforward at best. On the other hand, it was found that in the end MISP is \nonly a tool, a storage, to which threat information is saved, and it alone is not the \nanswer to efficient threat intel sharing and utilization, but it also requires clear \nprocesses, rules and standards, clear legislation, and motivated people to collect, \nhandle, and process the threat information. In addition, maintaining MISP and \nsolving errors were quite time-consuming processes at worst. The MISP platform \nhas potential, but it needs users who understand how it works and who are committed to follow agreed rules in sharing threat information.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-11-14T06:56:50Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-11-14T06:56:50Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "49", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "uhkatieto", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "MISP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "uhkatunniste", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Uhkatietojen mahdollisuudet korkeakoulujen tietoturvassa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202311147934", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "korkeakoulut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|