fullrecord |
[{"key": "dc.contributor.advisor", "value": "Vuorinen, Jukka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kelo, Anton", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-10T05:21:36Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-10T05:21:36Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95682", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teknologian nopeassa kehityksess\u00e4 turvallisuus ja s\u00e4\u00e4ntely kehittyv\u00e4t j\u00e4ljess\u00e4,\nerityisesti tieto- sek\u00e4 dataturvallisuuteen liittyv\u00e4t ongelmat ovat puhuttaneet\nteknologia-alalla viimevuosien aikana. T\u00e4m\u00e4 tutkimus on t\u00e4rke\u00e4 teknologisen\nkehityksen havainnollistamiseksi teknologian hallintaan ja turvallisuuteen\nliittyvien n\u00e4k\u00f6kulmien kannalta, jotka ovat t\u00e4rkeit\u00e4 alan tutkimuksessa ja\nkehityksess\u00e4. Tutkimus tarkasteli dataturvallisuuden kehityst\u00e4 erityisesti\nkybermaailman turvallisuuteen liittyvien elementtien yhteydess\u00e4\nkirjallisuuskatsauksen keinoin, k\u00e4ytt\u00e4en l\u00e4htein\u00e4 tutkimuksia, kirjoja, sek\u00e4\nyksitt\u00e4isi\u00e4 alan kattotason organisaatioiden internetjulkaisuja. Tutkimus\nkeskittyi kyberturvallisuuden elementeist\u00e4 erityisesti uhkien havainnointiin\nliittyvien j\u00e4rjestelmien dataturvallisuuteen, sek\u00e4 tarkasteli niiden kyky\u00e4\ntoteuttaa dataturvallisuuden vaatimuksia. Dataturvallisuutta tarkisteltiin alalla\nyleisesti k\u00e4ytetyn mallin, CIA-triadin avulla, sen osa-alueita ovat\nluottamuksellisuus, eheys, ja saavutettavuus. Data- ja kyberturvallisuuden\nantaminen teko\u00e4lysovellusten k\u00e4siin on her\u00e4tt\u00e4nyt keskustelua alalla. Tutkimus\nkeskittyi my\u00f6s tarkastelemaan, kuinka luotettavana havainnointij\u00e4rjestelmi\u00e4 voi\npit\u00e4\u00e4 koostamalla tietoja j\u00e4rjestelmien suorituskyvyist\u00e4. Tutkimus tuo\nkyberturvallisuutta ja uhkahavainnointia l\u00e4hemm\u00e4s lukijan ymm\u00e4rryst\u00e4, jonka\navulla lukijan on helpompi ymm\u00e4rt\u00e4\u00e4 ja n\u00e4hd\u00e4 automaattisen\nuhkahavainnoinnin k\u00e4ytt\u00f6tapauksia tai turvallisuutta. Tutkimus osoitti sen, ett\u00e4\nkoneoppimisen tarjoamat mahdollisuudet s\u00e4ilytt\u00e4v\u00e4t dataturvallisuuden hyvin,\ntuottaen samalla erinomaisia tuloksia uhkien havainnoinnissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "With the rapid development of technology, security and regulation are lagging,\nand in particular information and data security issues have been a major\nconcern for the technology sector in recent years. This study is important to\nillustrate the technological developments in terms of technology governance\nand security aspects, which are important for research and development in the\nfield. The study examined the evolution of data security, specifically in the\ncontext of the security elements of the cyber world, through a literature review,\nusing studies, books, and individual Internet publications of umbrella\norganizations in the field as sources. Among the elements of cybersecurity, the\nstudy focused specifically on the data security of threat detection systems and\nexamined their ability to implement data security requirements. Data security\nwas reviewed using a commonly used model in the industry, the CIA triad,\nwith the components of confidentiality, integrity, and accessibility. Putting data\nand cybersecurity in the hands of AI applications has sparked debate in the\nindustry. The study also focused on examining how reliable observation\nsystems can be considered by compiling data on system performance. The\nstudy brings cybersecurity and threat intelligence closer to the reader's\nunderstanding, making it easier for the reader to understand and see the use\ncases or security of automated threat intelligence. The study showed that the\ncapabilities offered by machine learning preserve data security well while\ndelivering excellent results in threat detection.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2024-06-10T05:21:36Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-10T05:21:36Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "26", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "CIA-triad", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Threat detection", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Data Security And Automatic Threat Detection", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406104453", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "machine learning", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|