fullrecord |
[{"key": "dc.contributor.advisor", "value": "Vuorinen, Jukka", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sepp\u00e4nen, Eemeli", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-17T09:46:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-17T09:46:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95958", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Suurten kiristysohjelmahy\u00f6kk\u00e4yksien m\u00e4\u00e4r\u00e4 on kasvanut huomattavasti viimeisen kymmenen vuoden aikana. Hy\u00f6kk\u00e4ysten lis\u00e4\u00e4ntyess\u00e4 my\u00f6s kriittiseen infrastruktuuriin kohdistuvat iskut ovat yleistyneet. Tunnettuja esimerkkej\u00e4 ovat esimerkiksi WannaCry- ja NotPetya-kiristysohjelmat, jotka ovat aiheuttaneet suurta taloudellista vahinkoa usealle alan toimijalle. T\u00e4m\u00e4 tutkielma tarkasteli kriittisen infrastruktuurin teknologisia haavoittuvuuksia keskittyen erityisesti kiristysohjelmahy\u00f6kk\u00e4yksiin, kriittisen infrastruktuurin j\u00e4rjestelm\u00e4kokonaisuuksiin ja niiden v\u00e4listen yhteyksien luomiin riskeihin. Tutkielma jakoi eri j\u00e4rjestelm\u00e4kokonaisuudet informaatioteknologian j\u00e4rjestelmiin, operationaalisen teknologian j\u00e4rjestelmiin ja teollisuuden esineiden internetin j\u00e4rjestelmiin. Tutkimuksessa vastataan tutkimuskysymyksiin \u201dmink\u00e4laisia riskej\u00e4 tieteellinen kirjallisuus on tunnistanut kriittisen infrastruktuurin j\u00e4rjestelm\u00e4kokonaisuuksista suhteessa kiristysohjelmahy\u00f6kk\u00e4yksiin? ja \u201dmihin j\u00e4rjestelmiin tapahtuneet kiristysohjelmahy\u00f6kk\u00e4ykset ovat kohdistuneet?\u201d. Tutkielma analysoi aiheen tieteellist\u00e4 kirjallisuutta ja merkitt\u00e4vi\u00e4 tietomurtoja kuvailevalla kirjallisuuskatsauksella. Tutkielmassa vertailtiin eri j\u00e4rjestelmien ja niiden v\u00e4listen yhteyksien riskej\u00e4 peilaten niit\u00e4 toteutuneisiin kiristysohjelmahy\u00f6kk\u00e4yksiin. Tutkielmassa my\u00f6s pohdittiin tulevia kehityskulkuja teollisuuden esineiden internetin laitteiden yleistyess\u00e4. Tutkielman tuloksien mukaan kriittisen infrastruktuurin laajojen j\u00e4rjestelm\u00e4kokonaisuuksien riskej\u00e4 on tunnistettu laajasti tieteellisess\u00e4 kirjallisuudessa. Tuloksien mukaan my\u00f6s teollisuuden esineiden internetin riskej\u00e4 on pyritty tarkastelemaan hypoteettisten hy\u00f6kk\u00e4ystilanteiden kautta, mutta niiden varsinaista roolia tulevissa hy\u00f6kk\u00e4yksiss\u00e4 ei olla viel\u00e4 t\u00e4ysin tunnistettu. J\u00e4rjestelmien v\u00e4lisiin yhteyksiin ja niiden lis\u00e4\u00e4ntymiseen pit\u00e4isi kiinnitt\u00e4\u00e4 enemm\u00e4n huomiota tulevaisuudessa. Tuloksista paljastuu, ett\u00e4 eri j\u00e4rjestelmien v\u00e4listen yhteyksien lis\u00e4\u00e4ntyminen luo todenn\u00e4k\u00f6isesti riskej\u00e4 erityisesti niille j\u00e4rjestelmille, joita ei ole luotu tietoturvallisuus etusijalla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "A trend of ransomware attacks on critical infrastructure has started as cybercriminal groups look for targets willing to pay large sums to recover their important data. As the amount of notorious ransomware attacks on critical infrastructure increase, more rigorous analysis of the common vulnerabilities and the risks they create for critical infrastructure is needed. This thesis aimed to create a wide understanding of why and how these attacks should be addressed by answering the following research questions: \u201chow has current scientific literature recognized the risks of ransomware attacks on different systems used by critical infrastructure?\u201d and \u201cwhich systems are targeted in ransomware attacks on critical infrastructure?\u201d. By analysing these issues this thesis aimed to give a concrete example of how ransomware attacks tend to happen to the multiple technological systems modern critical infrastructure utilize in their daily operations, and how the increasing interconnectedness of these systems has affected the situation. This thesis found that modern critical infrastructure employs different kinds of systems with varying levels of security in their implementations. Previous attacks suggest that a system connected to the internet often makes critical infrastructure vulnerable to attack, even in situations where the connected system is not directly used in operational actions. Furthermore, we find that the interconnectedness of these systems creates risks that have been underappreciated when developing new technology aimed at increasing efficiency.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2024-06-17T09:46:55Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-17T09:46:55Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "33", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kiristysohjelmat", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "operationaalinen teknologia", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "teollisuuden esineiden internet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kiristysohjelmahy\u00f6kk\u00e4ykset ja kriittisen infrastruktuurin j\u00e4rjestelmien riskit", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406174724", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kriittinen infrastruktuuri", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|