fullrecord |
[{"key": "dc.contributor.advisor", "value": "Vuorinen, Jukka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Orpana, Kia", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-24T10:58:12Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-24T10:58:12Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95178", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietojenkalastelu on yksi suurimpia uhkia internetiss\u00e4, joten se aiheuttaa turvallisuusriskin k\u00e4ytt\u00e4jille sek\u00e4 palveluille. Uhkan suuruutta lis\u00e4\u00e4 my\u00f6s erilaisten kalastelumenetelmien olemassaolo, sill\u00e4 yhden menetelm\u00e4n ehk\u00e4iseminen ei v\u00e4ltt\u00e4m\u00e4tt\u00e4 suojaa toiselta menetelm\u00e4lt\u00e4. Lis\u00e4ksi kalastelulla voidaan aiheuttaa vahinkoa esimerkiksi arkaluontoisen tiedon p\u00e4\u00e4tyess\u00e4 hy\u00f6kk\u00e4\u00e4j\u00e4lle. Vahinkojen v\u00e4hent\u00e4miseksi kalastelun ehk\u00e4iseminen sek\u00e4 k\u00e4ytt\u00e4jien ja palveluiden turvallisuuden lis\u00e4\u00e4minen on t\u00e4rke\u00e4\u00e4. Kalastelun ehk\u00e4isyll\u00e4 voidaan nostaa palveluiden turvallisuustasoa sek\u00e4 parantaa arkaluontoisen tiedon suojausta tietojenkalastelua vastaan. T\u00e4m\u00e4n takia t\u00e4ss\u00e4 kandidaatin tutkielmassa k\u00e4sitell\u00e4\u00e4n erilaisia tietojenkalastelun menetelmi\u00e4 sek\u00e4 menetelmiin soveltuvia ehk\u00e4isykeinoja. Ehk\u00e4isykeinot jaetaan palveluntarjoajalle sek\u00e4 k\u00e4ytt\u00e4j\u00e4lle soveltuviin keinoihin. T\u00e4m\u00e4n pohjalta suoritetaan vertailu tietojenkalastelun ehk\u00e4isemisen eroista palveluntarjoajan ja k\u00e4ytt\u00e4j\u00e4n n\u00e4k\u00f6kulmien v\u00e4lill\u00e4. Tutkielma on toteutettu kuvailevana kirjallisuuskatsauksena ja tutkimusprosessissa on hy\u00f6dynnetty tutkielman aiheeseen soveltuvia l\u00e4hteit\u00e4. Tutkielman tuloksissa esitell\u00e4\u00e4n tarkasteltuihin tietojenkalastelumenetelmiin soveltuvia ehk\u00e4isykeinoja ja ehk\u00e4isykeinojen jakautumista palveluntarjoajan sek\u00e4 k\u00e4ytt\u00e4j\u00e4n n\u00e4k\u00f6kulmiin. T\u00e4m\u00e4n pohjalta tuloksista p\u00e4\u00e4tell\u00e4\u00e4n, miten palveluntarjoajan ja k\u00e4ytt\u00e4j\u00e4n n\u00e4k\u00f6kulmat poikkeavat toisistaan kalastelun ehk\u00e4isyss\u00e4. Tuloksien perusteella keskeisiksi eroiksi n\u00e4k\u00f6kulmien kannalta havaitaan kalastelun ehk\u00e4isyn takana oleva motiivi, n\u00e4k\u00f6kulmiin soveltuvien ehk\u00e4isykeinojen tyyppi sek\u00e4 ehk\u00e4isykeinojen hy\u00f6dynt\u00e4minen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Phishing is one of the biggest threats on the internet and therefore phishing prevention as well as raising internet safety is important. The various existing phishing techniques can be hard to detect as well as prevent and as a result the techniques can cause damage if one falls victim to the phishing. This bachelor\u2019s thesis reviews different phishing techniques and prevention methods for the mentioned phishing techniques through a descriptive literature review. The prevention methods are divided into service provider\u2019s and user\u2019s perspective. Based on this division the perspectives will go through a comparison on how the perspectives differ from each other regarding phishing prevention. The results of the thesis present different prevention methods against phishing and the division of those methods to service provider\u2019s and user\u2019s perspectives. Based on these results the thesis includes conclusions on how the perspectives differ from each other regarding phishing prevention. The main differences between the perspectives are the motive behind phishing prevention, the suitable phishing prevention methods as well as the use of the prevention methods.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2024-05-24T10:58:12Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-24T10:58:12Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "37", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "palveluntarjoaja", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ehk\u00e4isykeinot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "K\u00e4ytt\u00e4jiin kohdistuva tietojenkalastelu ja sen ehk\u00e4iseminen palveluntarjoajan sek\u00e4 k\u00e4ytt\u00e4j\u00e4n n\u00e4k\u00f6kulmasta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405243943", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ehk\u00e4isy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "menetelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|