fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Packal\u00e9n, Joel", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-17T09:11:14Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-17T09:11:14Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94952", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberrikollisuus on yhteiskunnallisesti merkitt\u00e4v\u00e4 rikollisuuden muoto, joka aiheuttaa mittavaa vahinkoa vuosittain. Kyberrikollisuus jakautuu teknologi-asta riippuvaiseen tietoverkkosidonnaiseen rikollisuuteen, ja tietoverkkoja hy\u00f6dynt\u00e4v\u00e4\u00e4n tietoverkkoavusteiseen rikollisuuteen. T\u00e4ss\u00e4 tutkimuksessa kyberrikollisuutta k\u00e4sitell\u00e4\u00e4n tietoverkkosidonnaisen rikollisuuden n\u00e4k\u00f6kul-masta. \r\n2010-luvulla yhteiskunnissa tapahtui merkitt\u00e4v\u00e4\u00e4 digitalisaatiota ja tek-nologian yleistymist\u00e4, mik\u00e4 on vaikuttanut samalla kyberrikollisuuden edelly-tyksiin. Tietoteknologian ja s\u00e4hk\u00f6isten palveluiden yleistymisen my\u00f6t\u00e4 ky-bermaailma on tarjonnut alati laajentuvan hy\u00f6kk\u00e4yksellisen rajapinnan, jotka ovat vaikuttaneet my\u00f6s kyberrikollisten k\u00e4ytt\u00e4miin hy\u00f6kk\u00e4ysmenetelmiin. \r\nTutkimuksessa kyberrikollisuudessa k\u00e4ytettyj\u00e4 hy\u00f6kk\u00e4ystyyppej\u00e4, eli hy\u00f6k-k\u00e4ysaseita ja niiden vektoreita tutkittiin laadullisen sis\u00e4ll\u00f6n analyysin avulla. Tutkimusaineistona k\u00e4ytettiin kyberturvallisuutta k\u00e4sittelevi\u00e4 julkaisuja ja raportteja vuosien 2010 ja 2020 v\u00e4liselt\u00e4 ajalta, joiden kautta muodostettiin yleiskuva hy\u00f6kk\u00e4ystyyppien suosiosta eri vuosina. \r\nKyberrikollisuudessa k\u00e4ytetyiss\u00e4 hy\u00f6kk\u00e4ystyypeiss\u00e4 tapahtui jatkuvaa muutosta 2010-luvun aikana. Osa hy\u00f6kk\u00e4ystyyppien suosiosta on ollut sidok-sissa kyberrikollisten myymiin palveluihin, kuten haittaohjelma-alustoihin, ja osa taas hy\u00f6kk\u00e4yksien helppoon toteutettavuuteen. \r\nVuosikymmenen merkitt\u00e4vimpi\u00e4 haittaohjelmatyyppej\u00e4 olivat troijalaiset ja madot. N\u00e4ihin lukeutuvista haittaohjelmakategorioista merkitt\u00e4vimpi\u00e4 trendej\u00e4 olivat v\u00e4\u00e4r\u00e4t virustorjuntaohjelmat, bottiverkkoja luovat ohjelmat, pankkitroijalaiset ja kiristyshaittaohjelmat. N\u00e4iden lis\u00e4ksi keskeinen haittaoh-jelmien trendi olivat vuosikymmenen loppupuolella yleistyneet kryptovaluut-toja louhivat haittaohjelmat. \r\nHy\u00f6kk\u00e4ysalustoilla oli merkitt\u00e4v\u00e4 rooli haittaohjelmien levitt\u00e4misess\u00e4. Vuosikymmenen alkupuolella haittaohjelma-alustat olivat keskeinen haittaoh-jelmien levitystapa. Bottiverkkojen merkitys haittaohjelmien levitt\u00e4misess\u00e4 korostui vuosikymmenen lopussa haittaohjelma-alustojen kadottua markki-noilta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cybercrime is a significant form of crime that causes extensive damage on an annual basis. Cybercrime is divided into cyber-dependent crime and cyber-enabled crime. In this study cybercrime is addressed from the perspective of cyber-dependent crime. \r\nDigitalization and the wide adoption of technology have been important phenomena during the 2010s, which has also affected the conditions for cyber-crime. With the widespread adoption of information technology and electron-ic services, cybercriminals have been presented with an ever-expanding attack surface, which has also influenced the attack types used by cybercriminals. \r\nThe types of attacks used in cybercrime between the years 2010 and 2020 were examined through qualitative content analysis. The research material consisted of cybersecurity related reports mainly published between the years 2010 and 2020. The data was used to form an overview of the popularity of at-tack types in different years. \r\nThe attack types used in cybercrime have evolved continuously during the last decade. Some popular attack types have been linked to services and products sold by cybercriminals, such as malware and exploit-kits. \r\nIn a general sense, trojans and computer worms were the most signifi-cant types of malware used in cybercrime during the last decade. Among these malware categories, significant trends included fake antivirus programs, programs creating botnets, banking trojans, and ransomware. In addition to these, cryptojacking malware and the unauthorized mining of cryptocurren-cies formed a notable trend towards the end of the decade. \r\nAttack platforms, such as exploit-kits and botnets played an important role in malware distribution. During the first half of the decade, exploit-kits played an essential part in cybercrime. Botnets were also a popular commodi-ty in cybercriminal activities during the decade. The role of botnets in mal-ware distribution seemed to increase towards the end of the decade, as many notable exploit-kits became disrupted.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-05-17T09:11:14Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-17T09:11:14Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "88", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Kyberrikollisuudessa k\u00e4ytettyjen hy\u00f6kk\u00e4ystyyppien kehitys vuosina 2010-2020", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405173716", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|