Näytä suppeat kuvailutiedot

dc.contributor.advisorCostin, Andrei
dc.contributor.authorHuuhtanen, Olli
dc.date.accessioned2021-06-23T07:11:19Z
dc.date.available2021-06-23T07:11:19Z
dc.date.issued2021
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/76801
dc.description.abstractCybersecurity is an important core concept for all information systems currently being used. It is a subject that has become more relevant with each passing year as information systems become more and more prevalent in our everyday use. It is also often a very poorly understood concept by the general public, which contributes to the fact that the most severe cybersecurity threats most information system face are directly or indirectly caused by negligence by non-malicious humans, i.e. mistakes due to poorly understood practices and concepts. The subject of cybersecurity is heavily research, but there is always room for more research especially concerning more specific parts of information systems, like the embedded systems. This study focuses on embedded systems and their cybersecurity trends through the lens of CVE -entries. Embedded systems are generally defined as small and simple, but also critical, parts of larger systems, that are responsible for certain dedicated functions, which also contributes to their specific cybersecurity vulnerabilities.en
dc.format.extent68
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.titleThe use of CVE -related databases in improving the cybersecurity of embedded systems
dc.identifier.urnURN:NBN:fi:jyu-202106233996
dc.type.ontasotPro gradu -tutkielmafi
dc.type.ontasotMaster’s thesisen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.laitosInformaatioteknologiafi
dc.contributor.laitosInformation Technologyen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.rights.copyrightJulkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.fi
dc.rights.copyrightThis publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.en
dc.type.publicationmasterThesis
dc.contributor.oppiainekoodi601
dc.subject.ysotietoturva
dc.subject.ysokyberturvallisuus
dc.subject.ysouhat
dc.subject.ysoverkkohyökkäykset
dc.subject.ysoturvallisuus
dc.subject.ysotietokannat
dc.subject.ysodata security
dc.subject.ysocyber security
dc.subject.ysothreats
dc.subject.ysocyber attacks
dc.subject.ysosafety and security
dc.subject.ysodatabases
dc.format.contentfulltext
dc.type.okmG2


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot