fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tamminen, Bob", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-11-13T06:41:05Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-11-13T06:41:05Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98354", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkimuksessa tarkastellaan k\u00e4ynniss\u00e4 olevaan Ukrainan sotaan liittyvi\u00e4 ky-berhy\u00f6kk\u00e4yksi\u00e4. Maailmassa, jossa kyberhy\u00f6kk\u00e4ykset yleistyv\u00e4t ja maailman-poliittinen tilanne k\u00e4rjistyy, kyberhy\u00f6kk\u00e4ysten attribuoinnin merkitys kasvaa. On yh\u00e4 t\u00e4rke\u00e4mp\u00e4\u00e4 tiet\u00e4\u00e4 mik\u00e4 toimija on kyberhy\u00f6kk\u00e4yksen tekij\u00e4. T\u00e4m\u00e4n tutkimuksen tarkoitus on valottaa, miten kyberhy\u00f6kk\u00e4yksi\u00e4 ajankohtaisessa kontekstissa on attribuoitu. Lis\u00e4ksi tutkimuksella pyrit\u00e4\u00e4n tuomaan lis\u00e4arvoa tarkastelemalla my\u00f6s sit\u00e4, kuka attribuoi kyberhy\u00f6kk\u00e4yksi\u00e4 sek\u00e4 attribuoivan toimijan suhdetta kyberhy\u00f6kk\u00e4yksen kohteeseen. \nTutkimus on toteutettu kirjallisuuskatsauksen ja dokumenttianalyysin yhdistelm\u00e4n\u00e4. Kirjallisuuskatsauksessa on k\u00e4ytetty l\u00e4hinn\u00e4 aiempaa tutkimusta aiheesta ja dokumenttianalyysissa kansalaisj\u00e4rjest\u00f6n CyberPeace Instituten tie-tokantaa Ukrainan sotaan liittyvist\u00e4 kyberhy\u00f6kk\u00e4yksist\u00e4.\nTutkimusaineiston perusteella yleisin attribuointikeino on itseattribuointi. N\u00e4it\u00e4 tapauksia ei kuitenkaan ole sis\u00e4llytetty t\u00e4h\u00e4n tutkimukseen koska ne ei-v\u00e4t valota sit\u00e4, miten attribuointi tapahtuu. Tutkimuksen perusteella yleisin keino attribuoida kyberhy\u00f6kk\u00e4yksi\u00e4 on haittaohjelma, joka sitoo hy\u00f6kk\u00e4yksen tiettyyn toimijaan. Haittaohjelma toimii yleens\u00e4 muiden indikaattoreiden kans-sa attribuoinnin perustana. Toiseksi yleisin keino attribuoida kyberhy\u00f6kk\u00e4yk-si\u00e4 on tutkimuksen perusteella verkkotunnus. Verkkotunnus on toiminut attri-buoivana indikaattorina varsinkin disinformaatiotapauksissa.\nTutkimuksessa Ukraina oli yksitt\u00e4isen\u00e4 maana yleisin hy\u00f6kk\u00e4yksen koh-demaa ja attribuoiva taho oli my\u00f6s yleens\u00e4 ukrainalainen julkisella puolella toimiva CERT-UA. Tutkimuksen perusteella viranomaiset ovat attribuoineet enemm\u00e4n hy\u00f6kk\u00e4yksi\u00e4 kuin yksityiset toimijat. Yksityissektorin kyberturvalli-suustoimijoista varsinkin yhdysvaltalaiset toimijat ovat merkitt\u00e4v\u00e4 tekij\u00e4. \nT\u00e4m\u00e4n tutkimuksen tulokset eiv\u00e4t ole yleist\u00e4viss\u00e4, mutta antavat toivottavasti lis\u00e4\u00e4 ymm\u00e4rryst\u00e4 ilmi\u00f6st\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-11-13T06:41:05Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-11-13T06:41:05Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "55", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Ukrainan sotaan liittyvi\u00e4 kyberattribuointeja", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202411137198", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|