Kyberfyysisten järjestelmien turvallisuusuhat

Kyberfyysiset järjestelmät ovat muovautuneet hyvin isoksi osaksi elämäämme, vaikka tämä ei ole aina niin näkyvää. Näitä järjestelmiä löytyy esimerkiksi kodeista, autoista tai työpaikoista ja ne saattavat olla vastuussa äärimmäisen tärkeistä tehtävistä. Tästä syystä on tärkeää tutkia miten näitä järj...

Full description

Bibliographic Details
Main Author: Haarala, Lassi
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/95421
_version_ 1828193196351422464
author Haarala, Lassi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Haarala, Lassi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Haarala, Lassi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Haarala, Lassi
datasource_str_mv jyx
description Kyberfyysiset järjestelmät ovat muovautuneet hyvin isoksi osaksi elämäämme, vaikka tämä ei ole aina niin näkyvää. Näitä järjestelmiä löytyy esimerkiksi kodeista, autoista tai työpaikoista ja ne saattavat olla vastuussa äärimmäisen tärkeistä tehtävistä. Tästä syystä on tärkeää tutkia miten näitä järjestelmiä voi kehittää turvallisiksi. Tämä kirjallisuuskatsaus pyrkii siis tuomaan esiin oleellisia uhkia sulautettujen järjestelmien valmistuksessa ja tuomaan selkoa niiden turvalliseen kehitykseen. Cyber-physical systems have become an integral part of out lives even though this isn’t always so apparent. These systems can be found in our homes, cars and workplaces and they can be responsible of very crucial tasks. Therefore it is important to study how embedded systems can be developed to be safe. This literature review aims to showcase relevant threats when building embedded systems and to also introduce ways to develop them more safely.
first_indexed 2024-06-03T20:00:49Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Auvinen, Annemari", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Haarala, Lassi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-03T05:40:10Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-03T05:40:10Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95421", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberfyysiset j\u00e4rjestelm\u00e4t ovat muovautuneet hyvin isoksi osaksi el\u00e4m\u00e4\u00e4mme,\nvaikka t\u00e4m\u00e4 ei ole aina niin n\u00e4kyv\u00e4\u00e4. N\u00e4it\u00e4 j\u00e4rjestelmi\u00e4 l\u00f6ytyy esimerkiksi kodeista, autoista\ntai ty\u00f6paikoista ja ne saattavat olla vastuussa \u00e4\u00e4rimm\u00e4isen t\u00e4rkeist\u00e4 teht\u00e4vist\u00e4. T\u00e4st\u00e4 syyst\u00e4\non t\u00e4rke\u00e4\u00e4 tutkia miten n\u00e4it\u00e4 j\u00e4rjestelmi\u00e4 voi kehitt\u00e4\u00e4 turvallisiksi. T\u00e4m\u00e4 kirjallisuuskatsaus\npyrkii siis tuomaan esiin oleellisia uhkia sulautettujen j\u00e4rjestelmien valmistuksessa ja tuomaan selkoa niiden turvalliseen kehitykseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cyber-physical systems have become an integral part of out lives even though this\nisn\u2019t always so apparent. These systems can be found in our homes, cars and workplaces\nand they can be responsible of very crucial tasks. Therefore it is important to study how\nembedded systems can be developed to be safe. This literature review aims to showcase\nrelevant threats when building embedded systems and to also introduce ways to develop\nthem more safely.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-06-03T05:40:10Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-03T05:40:10Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "23", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Kyberfyysisten j\u00e4rjestelmien turvallisuusuhat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406034187", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sulautettu tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_95421
language fin
last_indexed 2025-03-31T20:02:07Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/84bb9e83-9e97-44ae-99af-3aa63dad07f9\/download","text":"URN:NBN:fi:jyu-202406034187.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Haarala, Lassi Kyberfyysisten järjestelmien turvallisuusuhat Tietotekniikka Mathematical Information Technology 602 turvallisuus tietotekniikka esineiden internet sulautettu tietotekniikka
title Kyberfyysisten järjestelmien turvallisuusuhat
title_full Kyberfyysisten järjestelmien turvallisuusuhat
title_fullStr Kyberfyysisten järjestelmien turvallisuusuhat Kyberfyysisten järjestelmien turvallisuusuhat
title_full_unstemmed Kyberfyysisten järjestelmien turvallisuusuhat Kyberfyysisten järjestelmien turvallisuusuhat
title_short Kyberfyysisten järjestelmien turvallisuusuhat
title_sort kyberfyysisten järjestelmien turvallisuusuhat
title_txtP Kyberfyysisten järjestelmien turvallisuusuhat
topic Tietotekniikka Mathematical Information Technology 602 turvallisuus tietotekniikka esineiden internet sulautettu tietotekniikka
topic_facet 602 Mathematical Information Technology Tietotekniikka esineiden internet sulautettu tietotekniikka tietotekniikka turvallisuus
url https://jyx.jyu.fi/handle/123456789/95421 http://www.urn.fi/URN:NBN:fi:jyu-202406034187
work_keys_str_mv AT haaralalassi kyberfyysistenjärjestelmienturvallisuusuhat