fullrecord |
[{"key": "dc.contributor.advisor", "value": "Meht\u00e4l\u00e4, Saana", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pellikka, Lauri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-03-12T06:47:43Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-03-12T06:47:43Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/93870", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Pitk\u00e4\u00e4n jatkunut yhteiskuntien digitalisaatio on tehnyt organisaatioista sek\u00e4 yksityishenkil\u00f6ist\u00e4 yh\u00e4 riippuvaisempia eri teknologioiden sek\u00e4 tietoj\u00e4rjestelmien mahdollistamista hy\u00f6dyist\u00e4. Kehityksen k\u00e4\u00e4nt\u00f6puolena rikollisuus sek\u00e4 muut haitalliset ja vaaralliset ilmi\u00f6t digitaalisissa ymp\u00e4rist\u00f6iss\u00e4 ovat my\u00f6s lis\u00e4\u00e4ntyneet. T\u00e4m\u00e4n kandidaatintutkielman tarkoituksena oli selvitt\u00e4\u00e4 etenkin 2010-luvulla valtavasti yleistyneiden kiristyshaittaohjelmien aiheuttamia uhkia niin organisaatioille kuin yksityishenkil\u00f6ille sek\u00e4 sit\u00e4, kuinka n\u00e4ihin uhkiin voitaisiin varautua. Tutkielma toteutettiin kuvailevana kirjallisuuskatsauksena, jossa analysoitiin laajasti kiristyshaittaohjelmia, niiden kehityst\u00e4, havaitsemista ja torjumista k\u00e4sittelevi\u00e4 vertaisarvioituja tieteellisi\u00e4 artikkeleita sek\u00e4 muuta aiheen kannalta relevanttia kirjallisuutta. Tutkielman tuloksena havaittiin, ett\u00e4 kiristyshaittaohjelmat aiheuttavat pahimmillaan eritt\u00e4in mittavia vahinkoja niin liiketoiminnalle kuin yksityishenkil\u00f6llekin. Haittaohjelmien tekij\u00e4t usein hy\u00f6dynt\u00e4v\u00e4t tekniikkaa, joiden havaitsemiseen ja torjumiseen ei ole olemassa yht\u00e4 kehittyneit\u00e4 ratkaisuja. Lis\u00e4ksi inhimillisten virheiden havaittiin olevan yksi merkitt\u00e4vimmist\u00e4 uhkatekij\u00f6ist\u00e4. Uhkiin varautumiseen liittyvi\u00e4 tekij\u00f6it\u00e4 tutkittaessa havaittiin tehokkaimmiksi yleisesti tieto- ja kyberturvallisuutta edist\u00e4v\u00e4t toimet, joskin tietoturvaorganisaatioilla on my\u00f6s t\u00e4ysin omia tekniikoita kiristyshaittaohjelmien havaitsemiseen sek\u00e4 torjumiseen. Torjuntatekniikoiden kehitt\u00e4misen sek\u00e4 ihmisten tietoisuuden lis\u00e4\u00e4misen tueksi aiheen lis\u00e4tutkimukselle on tarvetta tulevaisuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The long-standing digitization of societies has made organizations and individuals increasingly dependent on the benefits enabled by various technologies and information systems. However, the flip side of this development is the rise of criminal activities and other harmful phenomena in digital environments. This bachelor's thesis aimed to explore the threats posed by ransomware, a type of malicious software that became widespread, particularly in the 2010s, to both organizations and individuals, and how these threats could be prevented. The thesis was conducted as a descriptive literature review, analyzing peer-reviewed scientific studies and articles that addressed ransomware, its development, detection, and prevention. The findings revealed that ransomware can cause extensive damage to both businesses and individuals. Criminals often exploit techniques for which there are no equally advanced solutions. Additionally, human errors were identified as one of the most significant threat factors. Beyond mitigation techniques and human awareness, there is a need for further research in this field. Among the factors related to preparedness, measures promoting general information and cybersecurity were found to be the most effective, although security organizations also employ unique techniques for detecting and mitigating ransomware.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-03-12T06:47:43Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-03-12T06:47:43Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "26", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kiristyshaittaohjelma", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "uhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tartunta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kiristyshaittaohjelmiin liittyv\u00e4t uhat sek\u00e4 niihin varautuminen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202403122330", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ennaltaehk\u00e4isy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "havaitseminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "digitalisaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "rikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "varautuminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|