fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koskim\u00e4ki, Timo", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-09-30T13:20:58Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-09-30T13:20:58Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/97307", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kybertoimintaymp\u00e4rist\u00f6n uhkatoimijat operoivat ja toimivat erityisesti pime\u00e4n verkon anonymiteettien alla. T\u00e4ss\u00e4 tutkimuksessa l\u00e4hestyt\u00e4\u00e4n pime\u00e4n verkon hy\u00f6dynt\u00e4mist\u00e4 ennakoivan kybertilannekuvan luonnissa ja yll\u00e4pidossa Shakarian (2017) esitt\u00e4m\u00e4n neliportaisen Kyberuhkatiedustelun tasomallin mukaisesti. T\u00e4m\u00e4n Pro gradu tutkimuksen tuloksena voidaan sanoa, ett\u00e4 kattavan ja aktiivisen kyberuhkatiedustelun avulla voidaan tuottaa laadukasta ja ennakoivaa kybertilannekuvaa. Ennakoivan kybertilannekuvan avulla voidaan varautua ja puolustautua uhkaavilta toimijoilta. Tutkimus ei tuota mit\u00e4\u00e4n t\u00e4sm\u00e4asetta kyberuhkiin, vaan kertoo yleisp\u00e4tev\u00e4sti mallin, jonka avulla on mahdollista tuottaa tietoa omasta kybertoimintaymp\u00e4rist\u00f6st\u00e4\u00e4n siten, ett\u00e4 t\u00e4m\u00e4n tiedon avulla saadaan puolustautumista aktiivisesti s\u00e4\u00e4detty\u00e4 ajan trendien ja uhkatoimijoiden resurssien mukaiseen muotoon.\n\nAsiasanat: pime\u00e4 verkko, kybertilannekuva, ennakoiva kybertilannekuva, kyberuhkatiedustelu", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Threat actors in the cyber environment operate especially under the anonymity of the dark web. This study approaches the use of the dark web in creating and maintaining a proactive cyber situational awareness in accordance with the four-step level model of cyber threat intelligence presented by Shakaria (2017). As a result of this Master's thesis, it can be said that comprehensive and active cyber threat intelligence can be used to produce high-quality and predictive cyber situational awareness. Proactive cyber situational awareness can be used to prepare for and defend against threatening actors. The study does not produce any precision weapon for cyber threats but provides a general model that makes it possible to produce information about one's own cyber operating environment in such a way that this information can be used to actively adjust defence in accordance with current trends and the resources of threat actors.\n\nKeywords: dark web, cyber situational awareness, proactive cyber situational awareness, cyber threat intelligence, CTI", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-09-30T13:20:58Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-09-30T13:20:58Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "52", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Pime\u00e4n verkon hy\u00f6dynt\u00e4minen ennakoivan kybertilannekuvan luonnissa ja yll\u00e4pidossa", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202409306178", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi -maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Security and Strategic Analysis", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|