Enhancing Productivity with AI During the Development of an ISMS, Case Kempower

Hyökkäykset kyberturvallisuutta vastaan ovat lisääntyneet ja kehittyneet huimaa vauhtia, jonka takia eri alojen yritykset tarvitsevat tietoturvan johtamisjärjestelmän turvaamaan organisaationsa informaatiota. Muun muassa ISO 27001 on standardi, jonka viitekehyksien mukaan yritykset voivat tehdä oman...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Niemeläinen, Atro
Muut tekijät: Faculty of Information Technology, Informaatioteknologian tiedekunta, University of Jyväskylä, Jyväskylän yliopisto
Aineistotyyppi: Pro gradu
Kieli:fin
Julkaistu: 2024
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/95108
_version_ 1826225734025216000
author Niemeläinen, Atro
author2 Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto
author_facet Niemeläinen, Atro Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto Niemeläinen, Atro Faculty of Information Technology Informaatioteknologian tiedekunta University of Jyväskylä Jyväskylän yliopisto
author_sort Niemeläinen, Atro
datasource_str_mv jyx
description Hyökkäykset kyberturvallisuutta vastaan ovat lisääntyneet ja kehittyneet huimaa vauhtia, jonka takia eri alojen yritykset tarvitsevat tietoturvan johtamisjärjestelmän turvaamaan organisaationsa informaatiota. Muun muassa ISO 27001 on standardi, jonka viitekehyksien mukaan yritykset voivat tehdä oman tietoturvan johtamisjärjestelmänsä ja hakea siihen sertifikaattia. Samaan aikaan tekoäly on kehittynyt ja sen käyttö on yleistynyt huimaa vauhtia ja organisaatiot ottavatkin käyttöön eri tekoälyohjelmia. Tietoturvan johtamisjärjestelmän rakentaminen on aikaa ja rahaa vievä prosessi. Tässä Pro Gradu -tutkielmassa tutkitaan, kuinka tätä prosessia voitaisiin tehostaa hyödyntämällä tekoälyä muun muassa dokumentoinnin ensimmäisten luonnosten generoimisessa. Tutkielma käsittelee Kempower nimisen yrityksen tietoturvan johtamisjärjestelmä projektia ja siihen kuuluvia lukuisia eri vaiheita. Tutkielmassa käsitellään myös tekoälyn riskejä, tietoturvan elinkaarta ja muun muassa ISO 27001 standardia. Tutkielma toteutettiin puolistrukturoituja haastatteluita hyödyntäen. Haastateltaviksi valikoitui henkilöitä, jotka olivat projektissa mukana. Kempower nimitti projektiin eri liiketoimintafunktioista kyberresurssi henkilöitä, joiden tehtävänä oli tarkastaa Kempowerin kyberturvallisuus tiimin tekoälyn avulla tekemät dokumentit. Tutkimuksen tulokset osoittivat, että tekoälyn hyödyntäminen tietoturvan johtamisjärjestelmän tekemisessä säästi paljon resursseja. Sen huomasi selkeimmin projektin dokumentaatio vaiheessa. Tekoäly teki projektista mielekkäämmän ja se toi uusia näkökulmia asioihin. Tekoälyn avulla päästiin myös eroon tyhjän paperin kammosta, kun syöttämällä kehotteen tekoälylle sai aina dokumentin työstön käyntiin nopeasti. Tiedonhaku on aikaa vievä prosessi, joka saatiin eliminoitua melkein kokonaan tekoälyä hyödyntämällä. Tutkielmassa käsiteltiin myös tekoälyn käytön haittapuolia projektissa, joita oli muun muassa Kempower spesifin tiedon puute dokumentaation luonnoksista ja oppimisen puute ISO 27001 standardin eri kontrolleista tekoälyn käytön takia. Attacks against cyber security have increased and developed at a fast pace, which is why organizations need an information security management system (ISMS) to secure their organization's information assets. ISO 27001 is a standard which companies can use to create their own ISMS and apply for a certificate for it. At the same time, AI has evolved, and its use has become more common at a fast pace as organizations are using various AI tools. Building an information security management system is a time- and money-consuming process. This master’s thesis examines how this process could be made more efficient by using artificial intelligence (AI) in generating the first drafts of a control document for example. The thesis studies the ISMS project and its numerous different phases of a company called Kempower. The thesis also discusses the risks of AI, information security life cycle, and among other things, the ISO 27001 standard. In this thesis there was semi-structured interviews. People who were involved in the project were selected for interviews. Kempower appointed cyber resource personnels from different business functions to the project, whose task was to review the documents created by Kempower's cyber security team using artificial intelligence. The results of the study showed that utilizing artificial intelligence in creating an ISMS saved a lot of resources. It was most evident in the project’s documentation phase. AI made the project more interesting to work on and brought new perspectives to different things. With the help of AI, the fear of blank paper was also eliminated, as by entering a prompt to the AI, the processing of the document could always be started quickly and not from scratch. Searching for information is a time-consuming process that was almost completely eliminated by utilizing AI. The thesis also addressed the disadvantages of using AI in the project, such as the documents missing Kempower specific information, and lack of learning about different controls of the ISO 27001 standard due to the use of AI.
first_indexed 2024-05-23T20:01:03Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Mikkonen, Tommi", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Niemel\u00e4inen, Atro", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-23T07:37:15Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-23T07:37:15Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95108", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Hy\u00f6kk\u00e4ykset kyberturvallisuutta vastaan ovat lis\u00e4\u00e4ntyneet ja kehittyneet huimaa vauhtia, jonka takia eri alojen yritykset tarvitsevat tietoturvan johtamisj\u00e4rjestelm\u00e4n turvaamaan organisaationsa informaatiota. Muun muassa ISO 27001 on standardi, jonka viitekehyksien mukaan yritykset voivat tehd\u00e4 oman tietoturvan johtamisj\u00e4rjestelm\u00e4ns\u00e4 ja hakea siihen sertifikaattia. Samaan aikaan teko\u00e4ly on kehittynyt ja sen k\u00e4ytt\u00f6 on yleistynyt huimaa vauhtia ja organisaatiot ottavatkin k\u00e4ytt\u00f6\u00f6n eri teko\u00e4lyohjelmia.\nTietoturvan johtamisj\u00e4rjestelm\u00e4n rakentaminen on aikaa ja rahaa viev\u00e4 prosessi. T\u00e4ss\u00e4 Pro Gradu -tutkielmassa tutkitaan, kuinka t\u00e4t\u00e4 prosessia voitaisiin tehostaa hy\u00f6dynt\u00e4m\u00e4ll\u00e4 teko\u00e4ly\u00e4 muun muassa dokumentoinnin ensimm\u00e4isten luonnosten generoimisessa. Tutkielma k\u00e4sittelee Kempower nimisen yrityksen tietoturvan johtamisj\u00e4rjestelm\u00e4 projektia ja siihen kuuluvia lukuisia eri vaiheita. Tutkielmassa k\u00e4sitell\u00e4\u00e4n my\u00f6s teko\u00e4lyn riskej\u00e4, tietoturvan elinkaarta ja muun muassa ISO 27001 standardia.\nTutkielma toteutettiin puolistrukturoituja haastatteluita hy\u00f6dynt\u00e4en. Haastateltaviksi valikoitui henkil\u00f6it\u00e4, jotka olivat projektissa mukana. Kempower nimitti projektiin eri liiketoimintafunktioista kyberresurssi henkil\u00f6it\u00e4, joiden teht\u00e4v\u00e4n\u00e4 oli tarkastaa Kempowerin kyberturvallisuus tiimin teko\u00e4lyn avulla tekem\u00e4t dokumentit.\nTutkimuksen tulokset osoittivat, ett\u00e4 teko\u00e4lyn hy\u00f6dynt\u00e4minen tietoturvan johtamisj\u00e4rjestelm\u00e4n tekemisess\u00e4 s\u00e4\u00e4sti paljon resursseja. Sen huomasi selkeimmin projektin dokumentaatio vaiheessa. Teko\u00e4ly teki projektista mielekk\u00e4\u00e4mm\u00e4n ja se toi uusia n\u00e4k\u00f6kulmia asioihin. Teko\u00e4lyn avulla p\u00e4\u00e4stiin my\u00f6s eroon tyhj\u00e4n paperin kammosta, kun sy\u00f6tt\u00e4m\u00e4ll\u00e4 kehotteen teko\u00e4lylle sai aina dokumentin ty\u00f6st\u00f6n k\u00e4yntiin nopeasti. Tiedonhaku on aikaa viev\u00e4 prosessi, joka saatiin eliminoitua melkein kokonaan teko\u00e4ly\u00e4 hy\u00f6dynt\u00e4m\u00e4ll\u00e4. Tutkielmassa k\u00e4siteltiin my\u00f6s teko\u00e4lyn k\u00e4yt\u00f6n haittapuolia projektissa, joita oli muun muassa Kempower spesifin tiedon puute dokumentaation luonnoksista ja oppimisen puute ISO 27001 standardin eri kontrolleista teko\u00e4lyn k\u00e4yt\u00f6n takia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Attacks against cyber security have increased and developed at a fast pace, which is why organizations need an information security management system (ISMS) to secure their organization's information assets. ISO 27001 is a standard which companies can use to create their own ISMS and apply for a certificate for it. At the same time, AI has evolved, and its use has become more common at a fast pace as organizations are using various AI tools.\nBuilding an information security management system is a time- and money-consuming process. This master\u2019s thesis examines how this process could be made more efficient by using artificial intelligence (AI) in generating the first drafts of a control document for example. The thesis studies the ISMS project and its numerous different phases of a company called Kempower. The thesis also discusses the risks of AI, information security life cycle, and among other things, the ISO 27001 standard.\nIn this thesis there was semi-structured interviews. People who were involved in the project were selected for interviews. Kempower appointed cyber resource personnels from different business functions to the project, whose task was to review the documents created by Kempower's cyber security team using artificial intelligence.\nThe results of the study showed that utilizing artificial intelligence in creating an ISMS saved a lot of resources. It was most evident in the project\u2019s documentation phase. AI made the project more interesting to work on and brought new perspectives to different things. With the help of AI, the fear of blank paper was also eliminated, as by entering a prompt to the AI, the processing of the document could always be started quickly and not from scratch. Searching for information is a time-consuming process that was almost completely eliminated by utilizing AI. The thesis also addressed the disadvantages of using AI in the project, such as the documents missing Kempower specific information, and lack of learning about different controls of the ISO 27001 standard due to the use of AI.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-05-23T07:37:15Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-23T07:37:15Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "49", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Enhancing Productivity with AI During the Development of an ISMS, Case Kempower", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405233872", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_95108
language fin
last_indexed 2025-02-18T10:54:33Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Niemeläinen, Atro Enhancing Productivity with AI During the Development of an ISMS, Case Kempower Cyber Security Kyberturvallisuus
title Enhancing Productivity with AI During the Development of an ISMS, Case Kempower
title_full Enhancing Productivity with AI During the Development of an ISMS, Case Kempower
title_fullStr Enhancing Productivity with AI During the Development of an ISMS, Case Kempower Enhancing Productivity with AI During the Development of an ISMS, Case Kempower
title_full_unstemmed Enhancing Productivity with AI During the Development of an ISMS, Case Kempower Enhancing Productivity with AI During the Development of an ISMS, Case Kempower
title_short Enhancing Productivity with AI During the Development of an ISMS, Case Kempower
title_sort enhancing productivity with ai during the development of an isms case kempower
title_txtP Enhancing Productivity with AI During the Development of an ISMS, Case Kempower
topic Cyber Security Kyberturvallisuus
topic_facet Cyber Security Kyberturvallisuus
url https://jyx.jyu.fi/handle/123456789/95108 http://www.urn.fi/URN:NBN:fi:jyu-202405233872
work_keys_str_mv AT niemeläinenatro enhancingproductivitywithaiduringthedevelopmentofanismscasekempower