fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kuusio, Ari", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hakala, Heikki", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-11T06:18:56Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-11T06:18:56Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94761", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Inhimillisten tekij\u00f6iden, kuten huolimattomuuden ja virheiden merkitys tieto-murroissa on merkitt\u00e4v\u00e4. Esimerkiksi Verizonin Data Breach Investigations Raportin DBIR (2023) sek\u00e4 Gartnerin (2023a) tietoturvaohjeen mukaan vuonna 2022 tapahtuneissa tietomurroissa ja -vuodoissa 82 % piti sis\u00e4ll\u00e4\u00e4n inhimillisen tekij\u00e4n. T\u00e4ss\u00e4 tutkielmassa tarkastellaan ty\u00f6ntekij\u00f6iden tietoturvatietoisuutta puolustuskeinona s\u00e4hk\u00f6postikalastelua vastaan. Ratkaisua tutkimusongelmaan haetaan kahden tutkimuskysymyksen kautta. Aluksi tarkastellaan, miten s\u00e4hk\u00f6postikalastelijat pyrkiv\u00e4t huijaamaan kohteitaan. Ensin selvitet\u00e4\u00e4n s\u00e4hk\u00f6postikalasteluhy\u00f6kk\u00e4yksien onnistumiseen johtavia tekij\u00f6it\u00e4. Sen lis\u00e4ksi arvioidaan niiden merkityst\u00e4 kyberturvan kent\u00e4ll\u00e4. S\u00e4hk\u00f6postikalastelijoiden havaittiin huijaavan kohteitaan tekeytym\u00e4ll\u00e4 kohteelle entuudestaan tutuksi l\u00e4hett\u00e4j\u00e4ksi. Toisella tutkimuskysymyksell\u00e4 selvitet\u00e4\u00e4n tietoturvatietoisuuden rooli yrityksen tietoturvassa. Kirjallisuuskatsauksesta k\u00e4y ilmi tietoturvatietoisuuden olevan perusedellytys organisaation tietoturvakulttuurin luomisessa. Sen lis\u00e4ksi avataan tietoturvan, kyberturvan ja tietoturvatietoisuuden k\u00e4sitteit\u00e4 seikkaper\u00e4isemmin. Ihmiskeskeisen kyberturvan kautta pohditaan tietoturvatietoisuuden merkityksest\u00e4 pienien ja keskisuurien yritysten eli pk-yritysten tietoturvan rakentamisessa sek\u00e4 esitell\u00e4\u00e4n sen arvioimiseen k\u00e4ytett\u00e4vi\u00e4 mittareita. Luvussa esitell\u00e4\u00e4n my\u00f6s ty\u00f6ntekij\u00e4n tietoturvatietoisuuteen vaikuttavia psykologisia, fysiologisia, sosiaalisia sek\u00e4 organisatorisia tekij\u00f6it\u00e4. Viimeiseksi tarkastellaan ty\u00f6ntekij\u00f6iden tietoturvatietoisuuden ja s\u00e4hk\u00f6postikalastelun suhdetta ja merkityst\u00e4 toisiinsa pk-yritysten n\u00e4k\u00f6kulmasta. Tietoturvatietoisuuden voidaan ajatella mahdollistavan yritykselle oikeanlasten s\u00e4hk\u00f6postikalastelua ennaltaehk\u00e4isevien toimenpiteiden tekemisen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Human factors such as negligence and errors play a significant role in data breaches. For example, according to Verizon's Data Breach Investigations Report DBIR (2023) and Gartner's (2023a) security advisory, 82% of data breaches and leaks in 2022 involved a human factor. This thesis examines employee in-formation security awareness as a defense against email phishing. The solution to the research problem is sought through two research questions. First, the factors that lead to the success of an email phishing attack will be explored. It then assesses their relevance in the modern cyber security arena. Email phishers were found to deceive their targets by posing as a sender the recipient already knew. The second research question examines the role of security awareness in todays\u2019 cyber security of the enterprise. The literature review shows that security awareness is a basic prerequisite for creating a security culture in an organisation. In addition, the concepts of information security, cyber security and in-formation security awareness are explained in more detail. Through a human-centred cybersecurity approach, the importance of security awareness in building information security in small and medium-sized enterprises (SMEs) will be discussed and the indicators used to assess it will be presented. The chapter also presents the psychological, physiological, social, and organisational factors that influence employee security awareness. The final chapter presents the findings of the literature review and examines the relationship and importance of the relationship between employee security awareness and email phishing from the perspective of SMEs. Security awareness can be thought to enable a company to take the right preventive measures against email phishing.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-05-11T06:18:56Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-11T06:18:56Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvatietoisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sosiaalinen manipulointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "s\u00e4hk\u00f6postikalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ty\u00f6ntekij\u00f6iden tietoturvatietoisuus puolustuskeinona s\u00e4hk\u00f6postikalasteluun pk-yrityksiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405113532", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pienet ja keskisuuret yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ty\u00f6ntekij\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|