Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit

Tutkielmassa tarkastellaan kiristyshaittaohjelmien kehittäjien toimintatapoja ja motiiveja. Työ tutkii, keitä nämä kehittäjät ovat, miten heidän toimintansa on kehittynyt ja millaisia motiiveja heidän toimintansa taustalla yleensä on. Erityisesti tarkastellaan taloudellisia ja poliittisia motiiveja,...

Full description

Bibliographic Details
Main Author: Santamäki, Sami
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/99468
_version_ 1826225797686362112
author Santamäki, Sami
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Santamäki, Sami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Santamäki, Sami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Santamäki, Sami
datasource_str_mv jyx
description Tutkielmassa tarkastellaan kiristyshaittaohjelmien kehittäjien toimintatapoja ja motiiveja. Työ tutkii, keitä nämä kehittäjät ovat, miten heidän toimintansa on kehittynyt ja millaisia motiiveja heidän toimintansa taustalla yleensä on. Erityisesti tarkastellaan taloudellisia ja poliittisia motiiveja, jotka muodostavat perustan kiristyshaittaohjelmien kehittämiselle. Lisäksi tutkielmassa käsitellään kiristyshaittaohjelmien kehitystä ja sen taustalla olevia teknologisia sekä toiminnallisia muutoksia. The study examines the practices and motivations of ransomware developers. It explores who these developers are, how their operations have evolved, and what types of motivations typically drive their activities. The focus is particularly on economic and political motives, which form the basis for the development of ransomware. Additionally, the study addresses the evolution of ransomware and the technological and operational changes underlying it.
first_indexed 2025-01-15T21:05:24Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Misitano, Giovanni", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Santam\u00e4ki, Sami", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-01-15T07:24:50Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-01-15T07:24:50Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/99468", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielmassa tarkastellaan kiristyshaittaohjelmien kehitt\u00e4jien toimintatapoja ja motiiveja. Ty\u00f6 tutkii, keit\u00e4 n\u00e4m\u00e4 kehitt\u00e4j\u00e4t ovat, miten heid\u00e4n toimintansa on kehittynyt ja millaisia motiiveja heid\u00e4n toimintansa taustalla yleens\u00e4 on. Erityisesti tarkastellaan taloudellisia ja poliittisia motiiveja, jotka muodostavat perustan kiristyshaittaohjelmien kehitt\u00e4miselle. Lis\u00e4ksi tutkielmassa k\u00e4sitell\u00e4\u00e4n kiristyshaittaohjelmien kehityst\u00e4 ja sen taustalla olevia teknologisia sek\u00e4 toiminnallisia muutoksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The study examines the practices and motivations of ransomware developers. It explores who these developers are, how their operations have evolved, and what types of motivations typically drive their activities. The focus is particularly on economic and political motives, which form the basis for the development of ransomware. Additionally, the study addresses the evolution of ransomware and the technological and operational changes underlying it.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-01-15T07:24:50Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-01-15T07:24:50Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "22", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kiristyshaittaohjelma", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "RaaS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kiristyshaittaohjelmien kehitt\u00e4jien toimintatavat ja motiivit", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202501151236", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "motivaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_99468
language fin
last_indexed 2025-02-18T10:55:11Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/70849619-00e7-4aa6-b245-ce45f7eaa59a\/download","text":"URN:NBN:fi:jyu-202501151236.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Santamäki, Sami Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit kiristyshaittaohjelma RaaS Tietotekniikka Mathematical Information Technology 602 haittaohjelmat motivaatio kyberrikollisuus kyberturvallisuus
title Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
title_full Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
title_fullStr Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
title_full_unstemmed Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
title_short Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
title_sort kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
title_txtP Kiristyshaittaohjelmien kehittäjien toimintatavat ja motiivit
topic kiristyshaittaohjelma RaaS Tietotekniikka Mathematical Information Technology 602 haittaohjelmat motivaatio kyberrikollisuus kyberturvallisuus
topic_facet 602 Mathematical Information Technology RaaS Tietotekniikka haittaohjelmat kiristyshaittaohjelma kyberrikollisuus kyberturvallisuus motivaatio
url https://jyx.jyu.fi/handle/123456789/99468 http://www.urn.fi/URN:NBN:fi:jyu-202501151236
work_keys_str_mv AT santamäkisami kiristyshaittaohjelmienkehittäjientoimintatavatjamotiivit