Search results for "kyber"

showing 10 items of 188 documents

Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle

2017

information warfarecyber securityinformation networksinformaatiosodankäyntiinfrastruktuuritdigitalisationtietoturvakyberturvallisuustietoverkotdigitalisaatiodata securitydata systemsinfrastructurestietojärjestelmät
researchProduct

Cyber security of vehicle CAN bus

2019

There are currently many research projects underway concerning the intelligent transport system (ITS), with the intent to develop a variety of communication solutions between vehicles, roadside stations and services. In the near future, the roll-out of 5G networks will improve short-range vehicle-to-vehicle traffic and vehicle-to-infrastructure communications. More extensive services can be introduced due to almost non-delayed response time. Cyber security is central for the usability of the services and, most importantly, for car safety. The Controller Area Network (CAN) is an automation bus that was originally designed for real-time data transfer of distributed control systems to cars. La…

intrusion detectionälytekniikkarobottiautotkyberturvallisuuscvbersecurityverkkohyökkäyksetcarCAN bus
researchProduct

Strategic Communication for Cyber-security Leadership

2013

The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world. peerReviewed

johtaminenjulkinen keskustelulehdistökirjoittelucyber-securitygovernanceinformation securitytietohallintokyberturvallisuussysteemiajattelucyber security theory
researchProduct

Kyberosaamisen nykyiset ja tulevat tarpeet julkisen sektorin organisaatioissa

2017

Tutkimuksessa arvioidaan kahden julkisen sektorin organisaation kyberammatillisen osaamisen nykyisiä ja lähitulevaisuuden tarpeita. Tutkimuksen kohdeorganisaatioissa kyberammatillinen osaaminen liittyy vahvasti niiden ydintoimintoihin. Kyberammatillista osaamista tarkastellaan NCWF-viitekehyksen kategorioiden ja eritysalueiden kautta. Viitekehyksen luokittelujen perusteella laaditaan organisaatiokohtainen ydinkompetenssiesitys organisaatio-osaamisen näkökulmasta. Tutkimus edustaa laadullisen tutkimuksen case-lähestymistapaa, jossa aineistonkeruumuotona on teemahaastattelu ja aineiston analyysimenetelmänä teorialähtöinen sisällönanalyysi. Tulosten perusteella ydinkompetenssiesitysten painopi…

julkinen sektori [Asiasanat]case -tutkimusosaaminenkyberammatillinen osaaminenydinkompetenssiTapaustutkimuskyberturvallisuusjulkinen sektori
researchProduct

Basic Elements of Cyber Security for a Smart Terminal Process

2023

Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In Finland this development is going on and it is called SMARTER research program. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of Information and Communication Technology (ICT) and as well as on Industria…

järjestelmäarkkitehtuuricyber security managementlogistiikkamaritime logisticsälytekniikkamerenkulkusatamatSMARTERkyberturvallisuussmart portterminaalit
researchProduct

Development of Network Security Education

2021

Distance education has grown tremendously over the last decade. Internet technologies have enabled a large-scale dispensation of lectures, exercises, and training. Virtual Learning Management Systems (LMSs) offer a number of tools to realize distance education and distance learning. In this work, we present a virtual system architecture for training cyber security professionals with hands-on skills. The architecture is based on a VirtualBox virtualization environment. Guest machines are installed on an instance of VirtualBox. The installed environment offers a safe and isolated workbench for experiments. After installation and configuration of the environment, students perform a number of i…

järjestelmäarkkitehtuurioppimisympäristöComputer scienceNetwork securityDistance educationtietotekniikkacomputer.software_genreetäopetusComputingMilieux_COMPUTERSANDEDUCATIONnetwork securityverkko-opetusArchitecturetietoturvakyberturvallisuusMultimediabusiness.industryhallintajärjestelmätVirtualizationverkko-oppiminendistance educationManagement systemSystems architectureVirtual learning environmentThe Internetbusinesscomputerverkkohyökkäykset
researchProduct

Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach

2021

Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…

järjestelmäsuunnittelucybersecurityComputer scienceVulnerabilitySTRIDETK5101-6720cveComputer securitycomputer.software_genrethreat lifecyclestrideSoftwaretietokannattietoturvakyberturvallisuushaavoittuvuusweaknessesvulnerabilitiesScope (project management)business.industrytietokoneohjelmatTechnological innovationcwemapping automationohjelmistosuunnitteluSystems development life cycleTask analysisThreat modelTelecommunicationTask analysisManualsSystems designthreat modellingmallit (mallintaminen)ohjelmistokehitysbusinessEstimationcomputervulnerability lifecycleSoftware2021 29th Conference of Open Innovations Association (FRUCT)
researchProduct

Knowledge discovery using diffusion maps

2013

knowledge discoveryskientometriikkaanalyysimenetelmätdata miningvalvontajärjestelmätanomaly detectionkoneoppiminentoiminnallinen magneettikuvausdatabig datamanifold learningalgoritmitdiffusion mapstiedonlouhintateollisuuskyberturvallisuusclusteringdimensionality reduction
researchProduct

Smart Terminal System of Systems’ Cyber Threat Impact Evaluation

2023

Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part of the Sea4value program of DIMECC, aims to develop harbor operations, including passenger and cargo transportation, in a way that port processes will improve, emissions will decrease, and overall security will enhance in smart ports. This paper describes cyber-attack impacts against the Smart terminal system of systems in the cyber realm by utilizing the MITRE ATTACK® framework to map the objectives of threat actors. The Smart Terminal system environment includes ICT, IC…

kuljetusriskienhallintasatamatbusiness continuitythreat impactscyber ecosystemmerenkulkuterminal system of systemskyberturvallisuusverkkohyökkäyksetcybersecurity of ICTriskitcybersecurity of ICStietojärjestelmät
researchProduct

Tiedonlouhinta kyberterrorismin torjuntakeinona

2017

Terrorismi on teknologian kehittyessä siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei enää ole vain fyysinen, sillä ky-beravaruus mahdollistaa tietoverkkojen monipuolisen käytön terroristisiin tarpeisiin. Kyberterrorismin uhka on synnyttänyt tarpeen luoda uudenlaisia torjuntakeinoja. Yksi kyberterrorismin torjuntaan käytetyistä menetelmistä on tiedonlouhinta, jonka avulla pystytään tehokkaasti löytämään ennestään tun-tematonta tietoa suurista datamäärästä. Tässä tutkielmassa tutkitaan kyberter-rorismia ilmiönä sekä tiedonlouhinnan menetelmiä ja sovelluksia kyberterro-rismin torjuntaan. Tutkielma on kirjallisuuskatsaus, joka pohjautuu alan tie-teelliseen tu…

kyberterrorismikyberpuolustustiedonlouhinta
researchProduct