fullrecord |
[{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rihu, Miro Waltteri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-05T05:20:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-05T05:20:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95498", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This research focused on comparing the similarities and overlaps of different vulnerability scanning methods. The aim of this study was to answer questions such as does one scanning method include all the findings from another meth-od, and could it be used to replace the other method. The research was con-ducted as an empirical study built on the design science research framework, by creating a deliberately vulnerable dedicated test environment, which was scanned using various scanning methods. The empirical study showed that even though a credentialed vulnerability scan is the most comprehensive scan-ning method compared in the study, entirely comparable results are achievable by utilizing an uncredentialed port scan in conjunction with a host-based agent scan. The benefits of this combination of methods range from easier upkeep of vulnerability scanning to improved overall security by eliminating the need for separate, dedicated scanning credentials. Furthermore, the unauthenticated port scan proved to be the weakest method. Considering the research results and consulting the surrounding literature, a deeper understanding of vulnerability scanning methods was achieved. Based on this, a framework was created to aid in selecting the best suited method for both vulnerability and compliance scanning.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkimuksessa keskityttiin vertailemaan haavoittuvuusskannauksen eri metodien yht\u00e4l\u00e4isyyksi\u00e4 ja p\u00e4\u00e4llekk\u00e4isyyksi\u00e4. Tutkimuksen tarkoituksena oli vastata kysymyksiin, kuten voivatko yhden skannausmetodin tulokset pit\u00e4\u00e4 sis\u00e4ll\u00e4\u00e4n kaikki jonkun toisen metodin tulokset, ja voisivatko kyseiset metodit joltain osin korvata toisiaan. Tutkimus toteutettiin empiirisen\u00e4 tutkimuksena Design Science Research -viitekehyksen mukaisesti rakentamalla tarkoituksel-lisesti haavoittuvainen testiymp\u00e4rist\u00f6, jota skannattiin usealla eri haavoittu-vuusskannausmetodilla. Testitulosten perusteella kyet\u00e4\u00e4n tekem\u00e4\u00e4n johtop\u00e4\u00e4-t\u00f6s, ett\u00e4 vaikka tunnuksellinen autentikoitu haavoittuvuusskannaus olisi ver-tailluista skannausmenetelmist\u00e4 kattavin, l\u00e4hes sama skannaustulos voidaan my\u00f6s saavuttaa hy\u00f6dynt\u00e4m\u00e4ll\u00e4 tunnuksetonta autentikoimatonta- ja sovellus-agenttipohjaista haavoittuvuusskannausta. T\u00e4m\u00e4n edell\u00e4 mainitun metodien yhdistelm\u00e4n etuina voidaan n\u00e4hd\u00e4 muun muassa helpompi haavoittuvuus-skannauksen yll\u00e4pito ja menetelm\u00e4lle ominainen parempi tietoturvan taso, koska sen avulla kyet\u00e4\u00e4n eliminoimaan erillisten skannaustunnusten tarve. Lis\u00e4ksi autentikoimaton haavoittuvuusskannaus itsess\u00e4\u00e4n todettiin heikoim-maksi menetelm\u00e4ksi. Tutkimuksen tulosten ja alan kirjallisuuden pohjalta saa-vutettiin parempi ymm\u00e4rrys haavoittuvuusskannauksen metodien ominaisuuksista, ja t\u00e4m\u00e4n pohjalta tutkimuksessa kehitettiin viitekehys haavoittu-vuus- ja vaatimustenmukaisuuden skannausten menetelmien valintaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-06-05T05:20:46Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-05T05:20:46Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "101", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Haavoittuvuusskannausmenetelmien vertaileva tutkimus", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406054259", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|