Androidin tietoturva

Tämä kandidaatintutkielma käsittelee Androidin tietoturvaa ja siihen liittyviä haasteita. Tutkielmassa tarkastellaan Androidin tietoturvamallia, erilaisia tietoturvauhkia, kuten haavoittuvuuksia ja haittaohjelmia, sekä tietoturvan kehittämiseen liittyviä menetelmiä. Erityistä huomiota kiinnitetään s...

Full description

Bibliographic Details
Main Author: Pohjolainen, Paavo
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2023
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/92223
_version_ 1826225796686020608
author Pohjolainen, Paavo
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Pohjolainen, Paavo Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Pohjolainen, Paavo Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Pohjolainen, Paavo
datasource_str_mv jyx
description Tämä kandidaatintutkielma käsittelee Androidin tietoturvaa ja siihen liittyviä haasteita. Tutkielmassa tarkastellaan Androidin tietoturvamallia, erilaisia tietoturvauhkia, kuten haavoittuvuuksia ja haittaohjelmia, sekä tietoturvan kehittämiseen liittyviä menetelmiä. Erityistä huomiota kiinnitetään sovellusten tietoturvan kehittämiseen ja siihen, kuinka erilaiset analysointitekniikat ja menetelmät voivat auttaa parantamaan tietoturvan tasoa. This bachelor's thesis addresses the security of Android and the challenges associated with it. The study examines Android's security model, various security threats such as vulnerabilities and malware, and methods related to the development of security. Special attention is given to the development of security for applications and how different analysis techniques and methods can help improve the level of security.
first_indexed 2023-12-08T21:00:27Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Rossi, Tuomo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pohjolainen, Paavo", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-12-08T06:35:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-12-08T06:35:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/92223", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kandidaatintutkielma k\u00e4sittelee Androidin tietoturvaa ja siihen liittyvi\u00e4 haasteita. Tutkielmassa tarkastellaan Androidin tietoturvamallia, erilaisia tietoturvauhkia, kuten haavoittuvuuksia ja haittaohjelmia, sek\u00e4 tietoturvan kehitt\u00e4miseen liittyvi\u00e4 menetelmi\u00e4. Erityist\u00e4 huomiota kiinnitet\u00e4\u00e4n sovellusten tietoturvan kehitt\u00e4miseen ja siihen, kuinka erilaiset analysointitekniikat ja menetelm\u00e4t voivat auttaa parantamaan tietoturvan tasoa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor's thesis addresses the security of Android and the challenges associated with it. The study examines Android's security model, various security threats such as vulnerabilities and malware, and methods related to the development of security. Special attention is given to the development of security for applications and how different analysis techniques and methods can help improve the level of security.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-12-08T06:35:46Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-12-08T06:35:46Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "20", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "haavoittuvuudet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Androidin tietoturva", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202312088222", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiililaitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "matkapuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lypuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietokonevirukset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Android", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "virustentorjuntaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_92223
language fin
last_indexed 2025-02-18T10:54:58Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/2cd35da3-fbc0-4404-b6e9-cc5e9c05199b\/download","text":"URN:NBN:fi:jyu-202312088222.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Pohjolainen, Paavo Androidin tietoturva haavoittuvuudet Tietotekniikka Mathematical Information Technology 602 tietoturva käyttöjärjestelmät mobiililaitteet turvallisuus matkapuhelimet haittaohjelmat älypuhelimet tietokonevirukset Android virustentorjuntaohjelmat
title Androidin tietoturva
title_full Androidin tietoturva
title_fullStr Androidin tietoturva Androidin tietoturva
title_full_unstemmed Androidin tietoturva Androidin tietoturva
title_short Androidin tietoturva
title_sort androidin tietoturva
title_txtP Androidin tietoturva
topic haavoittuvuudet Tietotekniikka Mathematical Information Technology 602 tietoturva käyttöjärjestelmät mobiililaitteet turvallisuus matkapuhelimet haittaohjelmat älypuhelimet tietokonevirukset Android virustentorjuntaohjelmat
topic_facet 602 Android Mathematical Information Technology Tietotekniikka haavoittuvuudet haittaohjelmat käyttöjärjestelmät matkapuhelimet mobiililaitteet tietokonevirukset tietoturva turvallisuus virustentorjuntaohjelmat älypuhelimet
url https://jyx.jyu.fi/handle/123456789/92223 http://www.urn.fi/URN:NBN:fi:jyu-202312088222
work_keys_str_mv AT pohjolainenpaavo androidintietoturva