fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Alkiomaa, Jarno", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-12-12T07:46:32Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-12-12T07:46:32Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/92255", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teollisuus digitalisoituu siin\u00e4 miss\u00e4 muukin maailma, mutta digitalisaation my\u00f6t\u00e4 my\u00f6s riskit lis\u00e4\u00e4ntyv\u00e4t. Yh\u00e4 suurempi osa laitteista on jollain tavalla yhteydess\u00e4 toisiinsa ja internettiin. Teollisessa kontekstissa t\u00e4m\u00e4 tarkoittaa esimerkiksi sensoreita, robotteja, hallintaj\u00e4rjestelmi\u00e4 ja automaatiota. Nopean kehityksen takia turvallisuuteen liittyv\u00e4t toimet eiv\u00e4t aina kehity yht\u00e4 nopeasti. On kuitenkin standardeja, jotka auttavat tekem\u00e4\u00e4n laitteista turvallisia. Viime vuosina onkin huomioon p\u00e4\u00e4syt IEC 62443 standardi, josta puhutaan de facto standardina teollisuuden automaatiolaitteissa. Standardi antaa kokonaisvaltaisen viitekehyksen automaatiolaitteiden turvaamiseen. Vuonna 2019 standardiin lis\u00e4ttiin virallisesti alakohta 4\u20132, joka tuo turvaa automaatio ja IoT-laitteisiin jo valmistajan puolesta komponenttitasolla. Tutkimuksessa tarkastellaankin mit\u00e4 hy\u00f6tyj\u00e4 ja haasteita kyseinen standardi IEC 62443-4-2 tuo yrityksille. Tutkimus l\u00f6ysi hy\u00f6tyj\u00e4 suuremmasta l\u00e4pin\u00e4kyvyydest\u00e4 ja luotettavuudesta, hy\u00f6kk\u00e4yksien riskien pienentymisest\u00e4, hy\u00f6kk\u00e4yksilt\u00e4 suojautumisessa ja operatiivisen teknologian turvaamisesta. Kuitenkin haasteita tuottaa standardin kompleksisuus, rahallinen panostus, tasapainon l\u00f6yt\u00e4minen eri tasojen kanssa, ja puuttuva ohjeistus p\u00e4ivityksiin ja digitaaliseen forensiikkaan. Tutkimus tuotettiin systemaattisena kirjallisuuskatsauksena perustuen suuremmilta osin l\u00e4hteisiin, jotka ker\u00e4ttiin kolmesta eri tietokannasta. Aihe on viel\u00e4 verrattain uusi ja aiempaa tutkimusta on tehty v\u00e4h\u00e4n liittyen IEC 62443-4-2 standardiin. Aihe vaatisi viel\u00e4 syv\u00e4llisemp\u00e4\u00e4 tutkimusta ja yhteisty\u00f6t\u00e4 standardia k\u00e4ytt\u00e4vien yrityksien kanssa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Industry is becoming more digital as well as the rest of the world, but this digitalization also brings risks. An increasing number of devices are somehow connected to each other and to the internet. In an industrial context, this means sensors, robots, management systems and automation, for example. Due to rapid development, safety-related activities do not always develop as quickly. However, there are standards that help make devices safe. In recent years, the IEC 62443 standard has been spoken of as the de facto standard for industrial automation devices. The standard provides a comprehensive framework for securing automation devices. In 2019, subsection 4-2 was officially added to the standard, which brings security to automation and IoT devices on the manufacturer's behalf at component level. This study examines the benefits and challenges that IEC 62443-4-2 presents to companies. The study found benefits from greater transparency and reliability, reduced risk of attacks, protection from attacks, and protection for operative technology. However, challenges are presented by the complexity of the standard, monetary investment, finding a balance with different levels, and missing guidance on upgrades and digital forensics. The study was produced as a systematic literature review, largely based on sources collected from three different databases. The topic is still relatively new and previous research has been limited in relation to the IEC 62443-4-2 standard. The topic would require even more in-depth research and collaboration with companies using the standard.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-12-12T07:46:32Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-12-12T07:46:32Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "IEC 62443", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IEC 62443-4-2", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "I4.0", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Teollisuus 4.0", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "IEC 62443-4-2 standardin hy\u00f6dyt ja haasteet yritykselle : systemaattinen kirjallisuuskatsaus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202312128255", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "automaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teollisuusautomaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teollisuusyritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|