University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Kandidaatintutkielmat
  • View Item
JYX > Opinnäytteet > Kandidaatintutkielmat > View Item

Kodin IoT-laitteet ja tietoturva

Thumbnail
View/Open
97.49 Kb

Downloads:  
Show download detailsHide download details  
Authors
Lahti, Janne
Date
2022
Discipline
TietotekniikkaMathematical Information Technology
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.

 
Tässä tutkielmassa käydään läpi kodin IoT-laitteisiin liittyvää tietoturvaa. Kirjallisuuteen perehtymällä määritellään, millaisia esineitä kuuluu kodin IoT-laitteisiin, ja millaisia teknisiä ominaisuuksia niillä on. Laitteiden ja ominaisuuksien avulla hahmotetaan, millaisia suojautumisen keinoja niihin on mahdollista luoda. Suojautumisen ohella eritellään erilaisia vaihtoehtoja kohdistaa hyökkäyksiä IoT-laitteisiin. Lisäksi tutkielmassa tarkastellaan suhtautumista IoT-laitteiden tietoturvaan. Erityisesti valmistajien vastuuta tietoturvasta huolehtimisesta otetaan huomioon. Myös muiden toimijoiden, kuten valtioiden toimenpiteitä tietoturvan osalta eritellään.
 
This thesis analyzes the information security of home IoT devices. By reviewing the literature, it determines what kind of objects belong to home IoT devices and what technical properties they have. Devices and their features are used to outline what means of security can be created for them. In addition to security, various options to target attacks on IoT devices are specified. Also, the thesis examines the attitude towards the security of IoT devices. In particular, the responsibility of manufacturers for security is taken into account. The measures of other actors, such as states, towards information security are also specified.
 
Keywords
koti tietoturva esineiden internet verkkohyökkäykset
URI

http://urn.fi/URN:NBN:fi:jyu-202205102604

Metadata
Show full item record
Collections
  • Kandidaatintutkielmat [4424]

Related items

Showing items with similar title or keywords.

  • Esineiden internetin tietoturvauhkat teollisuuden yrityksissä 

    Räsänen, Aleksi (2018)
    Esineiden Internetin käyttö on ollut pitkään nousussa ja se on muokannut yhteiskuntaamme monella tavalla. Myös teollisuus on hyödyntänyt Esineiden Internetin sovelluksia monella tasolla. Haittavaikutuksina on kuitenkin ...
  • IoT -based adversarial attack's effect on cloud data platform services in a smart building context 

    Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)
    IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ...
  • Attacking TrustZone on devices lacking memory protection 

    Stajnrod, Ron; Ben Yehuda, Raz; Zaidenberg, Nezer Jacob (Springer Science and Business Media LLC, 2022)
    ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the ...
  • Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems 

    Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)
    Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ...
  • Intelligent Solutions for Attack Mitigation in Zero-Trust Environments 

    Zolotukhin, Mikhail; Hämäläinen, Timo; Kotilainen, Pyry (Springer, 2022)
    Many of today’s smart devices are rushed to market with little consideration for basic security and privacy protection, making them easy targets for various attacks. Therefore, IoT will benefit from adapting a zero-trust ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre