fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "K\u00e4rki, Meri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-23T10:56:17Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-23T10:56:17Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/99207", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietomurrot ovat nopeasti kasvava uhka digitalisoituneessa maailmassa, jossa yh\u00e4 enemm\u00e4n arkaluonteista tietoa tallennetaan s\u00e4hk\u00f6isesti. Vaikka teknologiat kehittyv\u00e4t, nykyiset toimenpiteet eiv\u00e4t riit\u00e4 est\u00e4m\u00e4\u00e4n tietomurtoja ja niiden haitallisia vaikutuksia. T\u00e4m\u00e4 tutkielma tarkasteli k\u00e4ytt\u00e4j\u00e4n roolia s\u00e4hk\u00f6postitilien suojaamisessa tietomurtoja vastaan. Tavoitteena oli selvitt\u00e4\u00e4, mill\u00e4 keinoilla k\u00e4ytt\u00e4j\u00e4t voivat suojata s\u00e4hk\u00f6postitilej\u00e4\u00e4n sek\u00e4 millaisia haasteita n\u00e4iden keinojen k\u00e4ytt\u00f6\u00f6n liittyy. Tutkielma toteutettiin kirjallisuuskatsauksena, jossa analysoitiin ajankohtaisia ja vertaisarvioituja tieteellisi\u00e4 artikkeleita. Tulokset osoittivat, ett\u00e4 monivaiheinen tunnistautuminen (MFA) on yksi tehokkaimmista tavoista suojata s\u00e4hk\u00f6postitilej\u00e4 tietomurtoja vastaan. MFA est\u00e4\u00e4 merkitt\u00e4v\u00e4sti luvattomia tunkeutumisia tileille, sill\u00e4 se vaatii hy\u00f6kk\u00e4\u00e4j\u00e4lt\u00e4 useampien todennus-tekij\u00f6iden murtamista pelk\u00e4n salasanan sijaan. K\u00e4ytt\u00e4jien tietoturvatietoisuuden ja tietojenkalasteluhy\u00f6kk\u00e4ysten tunnistamiskyvyn kehitt\u00e4minen, esimerkiksi pelillisten oppimisymp\u00e4rist\u00f6jen avulla, on keskeist\u00e4 inhimillisten virheiden v\u00e4hent\u00e4misess\u00e4. Lis\u00e4ksi organisaatioilla on t\u00e4rke\u00e4 vastuu tarjota k\u00e4ytt\u00e4jille kattavaa koulutusta, riitt\u00e4vi\u00e4 resursseja ja selkeit\u00e4 toimintamalleja turvallisten k\u00e4yt\u00e4nt\u00f6jen omaksumiseksi. Tutkimuksessa nousi esiin haasteita liittyen my\u00f6s j\u00e4rjestelmien k\u00e4ytett\u00e4vyyteen ja k\u00e4ytt\u00e4jien motivaatioon. Huomiota kiinnitettiin tarpeeseen l\u00f6yt\u00e4\u00e4 tasapaino turvallisuuden ja k\u00e4ytett\u00e4vyyden v\u00e4lill\u00e4, sill\u00e4 liian monimutkaiset ratkaisut voivat heikent\u00e4\u00e4 k\u00e4ytt\u00e4jien sitoutumista. Tutkimuksen tulokset tarjosivat kokonaisvaltaisen kuvan s\u00e4hk\u00f6postitilien suojaamisesta ja sen haasteista sek\u00e4 suosituksia tietomurtojen tehokkaampaan torjuntaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Data breaches are a rapidly growing threat in a digitalized world where increasingly sensitive information is stored electronically. Despite advancements in technology, current measures are insufficient to prevent data breaches and their harmful impacts. This study examined the user's role in protecting email accounts against data breaches. The objective was to identify methods that users can adopt to secure their email accounts and to explore the challenges associated with implementing these methods. The study was conducted as a literature review, analyzing current and peer-reviewed scientific articles. The findings indicate that multi-factor authentication (MFA) is one of the most effective ways to protect email accounts against data breaches. MFA significantly prevents unauthorized access to accounts, as it requires attackers to break multiple authentication factors rather than just cracking a single password. Improving users' cybersecurity awareness and their ability to recognize phishing attacks, for example, through gamified learning environments, is essential in reducing human errors. Furthermore, organizations have an important responsibility to provide users with comprehensive training, sufficient resources, and clear operational models to support the adoption of secure practices. The study also highlighted challenges related to the usability of systems and user motivation. Attention was drawn to the need to find balance in security and usability, as overly complex solutions can weaken user engagement. The findings provided a comprehensive overview of email account protection and its challenges, as well as recommendations for more effective prevention of data breaches.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-12-23T10:56:17Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-23T10:56:17Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "s\u00e4hk\u00f6postiturvallisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "monivaiheinen tunnistautuminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "CIA-kolmio", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "K\u00e4ytt\u00e4j\u00e4n rooli s\u00e4hk\u00f6postin suojaamisessa tietomurtoja vastaan", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412238010", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietomurto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tieto- ja viestint\u00e4rikokset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|