fullrecord |
[{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "H\u00e4m\u00e4l\u00e4inen, Toni", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-11-30T11:32:47Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-11-30T11:32:47Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/92156", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkimuksen tavoitteena oli tarkastella Windows 10-k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4ll\u00e4 toimivien ty\u00f6asemien koventamista ryhm\u00e4politiikan avulla. Windows 10 on yksi suosituimmista k\u00e4yt\u00f6ss\u00e4 olevista k\u00e4ytt\u00f6j\u00e4rjestelmist\u00e4, ja kyberturvallisuusuhkien tullessa yh\u00e4 vahvemmin osaksi niin organisaatioiden kuin yksityishenkil\u00f6idenkin arkea, tutkimus tarjoaa tietoa siit\u00e4, miten ryhm\u00e4politiikan avulla voidaan suojata kyseist\u00e4 k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4\u00e4 k\u00e4ytt\u00e4vi\u00e4 ty\u00f6asemia yksin-kertaisella, toimivalla ja skaalautuvalla tavalla. \n\nTutkimuksen teoreettinen tausta koostuu tunnettujen haavoittuvuuksien ja hy\u00f6kk\u00e4ysmallien, Windows 10 -k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n tietoturvan ja ryhm\u00e4politiikalla koventamisen, sek\u00e4 haavoittuvuusskannereiden tarkastelusta. T\u00e4m\u00e4n teoreettisen taustan tukemana tutkimus toteutettiin tapaustutkimuksena, jossa Windows 10 -k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4 kovennettiin valmiin ryhm\u00e4politiikan avulla. K\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n haavoittuvuudet skannattiin viiden eri skannerin avulla sek\u00e4 ennen ett\u00e4 j\u00e4lkeen koventamisen, ja koventamisen merkityst\u00e4 arvioitiin haavoittuvuusskannereiden tuottamien raporttien perusteella.\n\nTutkimuksen tulokset osoittivat, ett\u00e4 ryhm\u00e4politiikan avulla toteutettu koventaminen v\u00e4hensi skannereiden havaitsemien haavoittuvuuksien m\u00e4\u00e4r\u00e4\u00e4, mutta eri skannereiden v\u00e4lill\u00e4 oli selvi\u00e4 eroja sek\u00e4 havaittujen haavoittuvuuksien m\u00e4\u00e4r\u00e4ss\u00e4, sijainnissa, ett\u00e4 m\u00e4\u00e4rittelytavassa. Sen lis\u00e4ksi, ett\u00e4 tutkimus osoittaa ryhm\u00e4politiikan avulla toteutettavan koventamisen parantavan Windows 10-k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n tietoturvaa, tutkimus tarjoaa my\u00f6s havaintoja siit\u00e4, millainen Windows 10 -k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n turvallisuuden taso yleisell\u00e4 tasolla on, ja millaisia tuloksia erilaiset haavoittuvuusskannerit antavat k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n turvallisuudesta. Tutkimus vahvistaa ymm\u00e4rryst\u00e4 valmiiden ryhm\u00e4politiikkojen hy\u00f6dyllisyydest\u00e4 k\u00e4ytt\u00f6j\u00e4rjestelmien koventamisessa, sek\u00e4 korostaa useiden haavoittuvuusskannereiden k\u00e4yt\u00f6n merkityst\u00e4 haavoittuvuuksien tunnistamisessa. Tutkimuksen tuloksia voidaan hy\u00f6dynt\u00e4\u00e4 organisaatioissa k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n haavoittuvuuksien tunnistamiseen ja ehk\u00e4isemiseen k\u00e4ytett\u00e4vien ty\u00f6kalujen ja toimintatapojen suunnittelussa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The goal of this study was to inspect the hardening of Windows 10 operating system with group policy. Windows 10 is one of the most used operating systems and as cyber threats become more prevalent to organisations and individuals this study offers knowledge about how to leverage group policy in the process of hardening Windows 10 operating system in simple, efficient, and scalable way. \n\nThe theoretical background of this study consists of known vulnerabilities, attack models, the security of Windows 10, hardening with group policy, and inspection of vulnerability scanners. With the support of this theoretical background the study was implemented as a case study where Windows 10 operating system was hardened with a preconfigured group policy. The vulnerabilities related to operating system were discovered by using five different vulnerability scanners. The scans were run before and after the hardening of the operating system. The success of hardening was evaluated through the vulnerability reports that were provided by the scanners. \n\nThe results show that hardening with preconfigured group policy did lessen the number of detected vulnerabilities. The was a big variety in the number of detected vulnerabilities between scanners as well as in the type of detected vulnerabilities and in the classification of these vulnerabilities. In addition to the result that the hardening enhances the security of Windows 10, this study also provides insights about the level of security of the operating system in general and what kind of results different vulnerability scanners provide related to the operating system. The study verifies that preconfigured group policies are beneficial in the process of hardening the operating system and high-lights the fact that multiple scanners should be used to detect vulnerabilities more comprehensively.\nThese results can be leveraged in organizations to help to plan what tools and procedures to use when detecting and preventing vulnerabilities.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-11-30T11:32:47Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-11-30T11:32:47Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "46", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "haavoittuvuusskanneri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "koventaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Windows 10 k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4n koventaminen ryhm\u00e4politiikalla", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202311308157", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "skannerit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Windows 10", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|