dc.contributor.advisor | Siponen, Mikko | |
dc.contributor.author | Yang, Yaping | |
dc.date.accessioned | 2018-09-06T10:17:47Z | |
dc.date.available | 2018-09-06T10:17:47Z | |
dc.date.issued | 2018 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/59443 | |
dc.description.abstract | The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics such as the security relevant problems, firms' practices, policies, evolving technologies, etc. In the discussion section, perspectives or frameworks from academic literature were brought in. | en |
dc.format.extent | 95 | |
dc.language.iso | en | |
dc.subject.other | information security | |
dc.subject.other | cyber security | |
dc.subject.other | computer security | |
dc.subject.other | digital business | |
dc.subject.other | information technology | |
dc.subject.other | cyber attacks and breaches | |
dc.subject.other | cyber intelligence | |
dc.title | Literature review of information security practice survey reports | |
dc.identifier.urn | URN:NBN:fi:jyu-201809064034 | |
dc.type.ontasot | Master’s thesis | en |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.laitos | Informaatioteknologia | fi |
dc.contributor.laitos | Information Technology | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.oppiaine | Tietojenkäsittelytiede | fi |
dc.contributor.oppiaine | Computer Science | en |
dc.rights.copyright | Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty. | fi |
dc.rights.copyright | This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. | en |
dc.contributor.oppiainekoodi | 601 | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tietoverkkorikokset | |
dc.subject.yso | tietomurto | |
dc.subject.yso | tietosuoja | |
dc.subject.yso | tietoturva | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | data | |
dc.subject.yso | haittaohjelmat | |
dc.subject.yso | cyber security | |
dc.subject.yso | netcrime | |
dc.subject.yso | data break-in | |
dc.subject.yso | data privacy | |
dc.subject.yso | data security | |
dc.subject.yso | cyber attacks | |
dc.subject.yso | data | |
dc.subject.yso | malware | |