fullrecord |
[{"key": "dc.contributor.advisor", "value": "M\u00e4kitalo, Niko", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Toivola, Petteri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-10-29T08:43:57Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-10-29T08:43:57Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/97813", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis explores the organizational strategies for preparing for and recovering from ransomware attacks. Ransomware incidents have become increasingly prevalent, posing significant threats that can result in severe financial losses and business disruptions. The primary objective of this research is to provide practical solutions and recommendations that organizations can adopt to develop robust recovery plans and ensure business continuity in the event of such attacks.\n\nThe thesis examines the capacity of organizations to both prepare for and recover from ransomware incidents. Key research questions include: What specific threats do organizations face from ransomware? How can organizations effectively prepare for and recover from ransomware attacks, particularly from a business continuity perspective? What are the ransomware threats an organization faces? The study also investigates various backup and recovery methods, evaluating their effectiveness in mitigating the impact of ransomware.\n\nThe literature review presents an analysis of ransomware operations, attack vectors, and the development of comprehensive recovery plans. The findings indicate that organizations must invest in both advanced technical solutions and staff training to effectively protect against and recover from ransomware incidents.\n\nThe thesis concludes with a set of practical recommendations designed to enhance organizational preparedness and resilience against ransomware. Additionally, the recommendations aim to foster broader awareness of information security best practices within organizations.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tarkastellaan kiristyshaittaohjelmiin varautumista ja niist\u00e4 palautumista organisaation n\u00e4k\u00f6kulmasta. Kiristyshaittaohjelmien yleistyminen on lis\u00e4nnyt merkitt\u00e4v\u00e4sti niit\u00e4 uhkia, jotka voivat johtaa vakaviin taloudellisiin menetyksiin ja liiketoiminnan keskeytymiseen. Tutkielman tavoitteena on esitt\u00e4\u00e4 k\u00e4yt\u00e4nn\u00f6n ratkaisuja ja suosituksia organisaatioille, jotta ne voivat kehitt\u00e4\u00e4 tehokkaita palautumissuunnitelmia ja varmistaa liiketoiminnan jatkuvuuden mahdollisten hy\u00f6kk\u00e4ysten varalta.\n\nTutkielma keskittyy organisaatioiden kykyyn varautua ja palautua kiristyshaittaohjelmahy\u00f6kk\u00e4yksist\u00e4. Keskeiset tutkimuskysymykset ovat: Mitk\u00e4 ovat organisaatioiden kohtaamat keskeisimm\u00e4t uhkat? Miten organisaatiot voivat varautua ja toipua kiristyshaittaohjelmahy\u00f6kk\u00e4yksist\u00e4 liiketoiminnan jatkuvuuden n\u00e4k\u00f6kulmasta? Mit\u00e4 ovat organisaation kohtaamat kiristyshaittaohjelma uhkat? Tutkimuksessa tarkastellaan erilaisia varmistus- ja palautusmenetelmi\u00e4 sek\u00e4 niiden soveltuvuutta kiristyshaittaohjelmahy\u00f6kk\u00e4ysten hallintaan ja niist\u00e4 toipumiseen.\n\nKirjallisuuskatsaus esittelee kiristyshaittaohjelmien toimintamekanismeja, hy\u00f6kk\u00e4ysmenetelmi\u00e4 sek\u00e4 palautumissuunnitelmien kehitt\u00e4misen periaatteita. Tulokset osoittavat, ett\u00e4 organisaatioiden on t\u00e4rke\u00e4\u00e4 investoida sek\u00e4 teknisiin suojautumisratkaisuihin ett\u00e4 henkil\u00f6st\u00f6n koulutukseen, jotta ne pystyv\u00e4t tehokkaasti torjumaan ja toipumaan kiristyshaittaohjelmahy\u00f6kk\u00e4yksist\u00e4.\n\nTutkielman lopputuloksena esitet\u00e4\u00e4n joukko k\u00e4yt\u00e4nn\u00f6n suosituksia organisaatioille, jotka haluavat parantaa valmiuksiaan varautua ja toipua kiristyshaittaohjelmahy\u00f6kk\u00e4yksist\u00e4. Lis\u00e4ksi suositukset pyrkiv\u00e4t edist\u00e4m\u00e4\u00e4n organisaatioiden tietoturvatietoisuutta laajemmin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-10-29T08:43:57Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-10-29T08:43:57Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "75", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Varautuminen ja palautuminen kiristyshaittaohjelmahy\u00f6kk\u00e4yksest\u00e4 organisaation n\u00e4k\u00f6kulmasta", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202410296666", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Specialisation in Software Development", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Ohjelmistokehityksen opintosuunta", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|