dc.contributor.advisor | Costin, Andrei | |
dc.contributor.author | Huuhtanen, Olli | |
dc.date.accessioned | 2021-06-23T07:11:19Z | |
dc.date.available | 2021-06-23T07:11:19Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/76801 | |
dc.description.abstract | Cybersecurity is an important core concept for all information systems currently being used. It is a subject that has become more relevant with each passing year as information systems become more and more prevalent in our everyday use. It is also often a very poorly understood concept by the general public, which contributes to the fact that the most severe cybersecurity threats most information system face are directly or indirectly caused by negligence by non-malicious humans, i.e. mistakes due to poorly understood practices and concepts. The subject of cybersecurity is heavily research, but there is always room for more research especially concerning more specific parts of information systems, like the embedded systems.
This study focuses on embedded systems and their cybersecurity trends through the lens of CVE -entries. Embedded systems are generally defined as small and simple, but also critical, parts of larger systems, that are responsible for certain dedicated functions, which also contributes to their specific cybersecurity vulnerabilities. | en |
dc.format.extent | 68 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.title | The use of CVE -related databases in improving the cybersecurity of embedded systems | |
dc.identifier.urn | URN:NBN:fi:jyu-202106233996 | |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.type.ontasot | Master’s thesis | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.laitos | Informaatioteknologia | fi |
dc.contributor.laitos | Information Technology | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.rights.copyright | Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty. | fi |
dc.rights.copyright | This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. | en |
dc.type.publication | masterThesis | |
dc.contributor.oppiainekoodi | 601 | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | uhat | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | tietokannat | |
dc.subject.yso | data security | |
dc.subject.yso | cyber security | |
dc.subject.yso | threats | |
dc.subject.yso | cyber attacks | |
dc.subject.yso | safety and security | |
dc.subject.yso | databases | |
dc.format.content | fulltext | |
dc.type.okm | G2 | |