fullrecord |
[{"key": "dc.contributor.advisor", "value": "Moilanen, Panu Jaakko Tapani", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koivula, Juho Hermanni", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-27T06:52:50Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-27T06:52:50Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/96181", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The subject of the study is \"cyber HUMINT.\" HUMINT means human intelligence collected by humans and/or from humans. The cyber prefix in the term \"cyber HUMINT\" means that it is conducted in cyberspace, an artificial environment. Interconnected systems and networks enable it. The study analyzed the online content of private cybersecurity organizations by answering the question, \u201cWhat is cyber HUMINT in cybersecurity?\u201d The study uses content analysis and draws on various academic sources to explore how human intelligence works in the traditional and digital era. The research method chosen is qualitative content analysis, a systematic approach to analyzing and interpreting the content of various online content providers' \"cyber HUMINT\" on cybersecurity. The approach follows the American tradition of grouping similar and disaggregated content to create a hierarchical structure where larger similar groups form a whole. The first subcategory covers techniques to gain insight into the intentions of threat actors and the evolving threat landscape. The second category highlights the importance of proactive cyber intelligence gathering to identify potential cyber threats before they cause damage. The latter highlights the role of \"cyber HUMINT\" in cyber threat intelligence and emphasizes its importance in forming preventive strategies based on the cyber threat landscape. Overall, this is a proactive approach to human-centered cyber threat intelligence. The study concludes that cyber HUMINT plays a significant role in gathering threat information from human sources to enhance cyber security measures. The study highlighted the human dimension of cybersecurity, cyber intelligence, and operations in cyberspace and the digital world. The study delved into how technology is transforming the method of human intelligence from a cybersecurity perspective. Automation to scale up operations, the ethics of operations, and compliance with the law due to human-centricity emerged as important perspectives.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkimuksen aihe on englanninkielinen termi \u201dcyber HUMINT\u201d. HUMINT tarkoittaa henkil\u00f6tiedustelua, joka on ihmisten avulla ja/tai ihmisilt\u00e4 ker\u00e4tty\u00e4 tietoa. Kyber-etuliite termiss\u00e4 \u201dcyber HUMINT\u201d tarkoittaa, ett\u00e4 sit\u00e4 toteutetaan kyberavaruudessa, joka on keinotekoinen ymp\u00e4rist\u00f6. Sen mahdollistavat toisiinsa kytketyt j\u00e4rjestelm\u00e4t ja verkot. Tutkimuksessa tarkasteltiin analysoimalla yksityisten kyberturvallisuusorganisaatioiden verkkosis\u00e4lt\u00f6\u00e4 vastaamalla kysymykseen: \u201dmit\u00e4 on cyber HUMINT kyberturvallisuudessa?\u201d Tutkimuksessa k\u00e4ytet\u00e4\u00e4n sis\u00e4ll\u00f6nanalyysi\u00e4 ja hy\u00f6dynnet\u00e4\u00e4n erilaisia akateemisia l\u00e4hteit\u00e4 sen selvitt\u00e4miseksi, miten henkil\u00f6tiedustelu toimii perinteisesti ja digitaalisella aikakaudella. Tutkimusmenetelm\u00e4ksi on valittu laadullinen sis\u00e4ll\u00f6nanalyysi, jo-ka on systemaattinen l\u00e4hestymistapa analysoida ja tulkita eri verkkosis\u00e4ll\u00f6n tarjoajien sis\u00e4lt\u00f6\u00e4 \u201dcyber HUMINT\u201d -toiminnasta kyberturvallisuudessa. L\u00e4hestymistapa noudattaa amerikkalaista perinnett\u00e4, ja siin\u00e4 ryhmitell\u00e4\u00e4n samankaltaista ja osiin purettua sis\u00e4lt\u00f6\u00e4 ja luodaan siten hierarkkinen rakenne, jossa suuremmat samankaltaiset ryhm\u00e4t muodostavat kokonaisuuden. Ensimm\u00e4inen alak\u00e4siteluokka kattaa tekniikat, joilla saadaan tietoa uhkatoimijoiden aikeista ja kehittyv\u00e4st\u00e4 uhkakuvasta. Toisessa kategoriassa korostetaan proaktiivisen kybertiedustelun ker\u00e4\u00e4misen merkityst\u00e4 mahdollisten kyberuhkien tunnistamisessa ennen kuin ne aiheuttavat vahinkoa. J\u00e4lkimm\u00e4isess\u00e4 korostetaan \u201dcyber HUMINT\u201d -toiminnan roolia kyberuhkatiedustelussa ja painotetaan sen merkityst\u00e4 torjuntastrategioiden muodostamisessa kyberuhkakuvan avulla. Kokonaisuudessaan kyseess\u00e4 on proaktiivinen l\u00e4hestymistapa ihmis-keskeisess\u00e4 kyberuhkatiedustelussa. Tutkimuksen johtop\u00e4\u00e4t\u00f6ksen\u00e4 on, ett\u00e4 \u201dcyber HUMINT\u201d on merkitt\u00e4v\u00e4ss\u00e4 asemassa uhkatietojen ker\u00e4\u00e4misess\u00e4 henkil\u00f6l\u00e4hteilt\u00e4 kyberturvatoimien tehostamiseksi. Tutkimuksessa korostui kyberturvallisuuden, kybertiedustelun ja kyberavaruudessa ja digitaalisessa maailmassa tapahtuvan toiminnan inhimillinen osa-alue. Tutkimuksessa syvennyttiin siihen, miten teknologia muuttaa henkil\u00f6tiedustelumenetelm\u00e4\u00e4 kyberturvallisuuden viitekehyksest\u00e4. T\u00e4rkein\u00e4 n\u00e4k\u00f6kulmina nousivat esiin automatisaatio operaatioiden skaalaamiseksi, toiminnan eettisyys ja lain noudattaminen ihmiskeskeisyyden vuoksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-06-27T06:52:50Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-27T06:52:50Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "53", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Cyber HUMINT In Cybersecurity: A Content Analysis", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406275025", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|