fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Takala, Aarne", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-06-28T06:33:41Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-06-28T06:33:41Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/96222", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Taloudellinen kybervakoilu on muodostunut merkitt\u00e4v\u00e4ksi uhkaksi valtioille ja\nyrityksille, koska yh\u00e4 suurempi osa liiketoiminnasta tapahtuu digitaalisessa\nymp\u00e4rist\u00f6ss\u00e4. T\u00e4m\u00e4 tutkielma k\u00e4sittelee taloudellisessa kybervakoilussa\nk\u00e4ytettyj\u00e4 menetelmi\u00e4 ja tekniikoita. Tutkielman tarkoituksena oli selvitt\u00e4\u00e4,\nmillaisia menetelmi\u00e4 k\u00e4ytet\u00e4\u00e4n taloudellisen tiedon varastamiseen ja mitk\u00e4 ovat\nn\u00e4iden menetelmien taloudelliset vaikutukset. Tutkielma toteutettiin\nsystemaattisena kirjallisuuskatsauksena ja aineisto ker\u00e4ttiin useista\nkansainv\u00e4lisist\u00e4 ja kotimaisista tietokannoista. Tutkielmassa havaittiin, ett\u00e4\nkeskeisimpi\u00e4 menetelmi\u00e4 taloudellisen kybervakoilun n\u00e4k\u00f6kulmasta ovat APT-\nhy\u00f6kk\u00e4ykset (advanced persistent threat), haittaohjelmat (malware) ja k\u00e4ytt\u00e4j\u00e4n\nmanipulointi (social engineering). N\u00e4it\u00e4 menetelmi\u00e4 hy\u00f6dynt\u00e4m\u00e4ll\u00e4 vakoilua\nsuorittavat toimijat p\u00e4\u00e4sev\u00e4t k\u00e4siksi arkaluontoiseen taloudelliseen tietoon, mik\u00e4\nvoi johtaa merkitt\u00e4viin taloudellisiin menetyksiin ja kilpailuedun menetykseen\nyrityksille ja valtioille. Tutkielma osoitti my\u00f6s, ett\u00e4 taloudellisen vakoilun\ntaustalla on usein p\u00e4\u00e4llekk\u00e4isi\u00e4 taloudellisia, poliittisia ja sotilaallisia motiiveja.\nLis\u00e4ksi huomattiin, ett\u00e4 uusien teknologioiden, kuten teko\u00e4lyn kehittyminen,\nlaajentaa ja tehostaa kybervakoilu uhkia ja tekee niiden torjumisesta entist\u00e4\nhaastavampaa. T\u00e4m\u00e4n tutkielman tulokset korostavat kybervakoilun vakavuutta\nja jatkuvan kehityksen tarvetta kyberturvallisuudessa yrityksien ja valtioiden\nkannalta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Economic cyber espionage has become a significant threat to states and\ncompanies as an increasing portion of business activities occurs in digital\nenvironments. This thesis examines the methods and techniques used in\neconomic cyber espionage. The purpose of the study was to identify the methods\nused for stealing economic information and to assess the economic impact of\nthese methods. The thesis was conducted as a systematic literature review, and\nthe source material was collected from various international and domestic\ndatabases. The study found that the key methods in economic cyber espionage\ninclude APT attacks (advanced persistent threat), malware, and social\nengineering. By utilizing these methods, espionage actors can access sensitive\neconomic information, leading to significant financial losses and loss of\ncompetitive advantage for companies and states. The study also revealed that\neconomic espionage is often driven by overlapping economic, political, and\nmilitary motives. Additionally, it was noted that the advancement of new\ntechnologies, such as artificial intelligence, expands and enhances cyber\nespionage threats, making them even more challenging to counteract. The\nfindings of the study underscore the seriousness of cyber espionage and the\nongoing need for development in cybersecurity for companies and states.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2024-06-28T06:33:41Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-06-28T06:33:41Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "taloudellinen vakoilu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybervakoilu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "APT- hy\u00f6kk\u00e4ykset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4n manipulointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Taloudellinen kybervakoilu : menetelm\u00e4t ja tekniikat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202406285064", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "vakoilu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "taloudelliset vaikutukset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|