24 research outputs found

    Oikeuksien hallintarakenteen uudelleensuunnittelu ja oikeuksien hallinnan automatisointi yrityksessä

    Get PDF
    The thesis studies the structure of permission management system used in a client organization and the ways to make it better and more simplified. The aim is to study what type of structure would best serve the client company and then create a new permission management structure based on the findings of the research. This study introduces the needs for permission management, required components for executing a functional permission management system and the implementation of new more functional permission management structure. To find out the best way to introduce the new structure and how it will improve the permission management in the client organization. Firstly the current structure will be examined. Secondly the existing structure will be remodeled to meet the needs of the client organization and to support role based permission structures. Thirdly the new permission management structure will be implemented as a part of the permission management system. The study results in new permission management structure that can be implemented as a company wide solution for permission management but with little effort can also be used as a basis for enterprise wide solution to permission management. The value of this study comes from the saved time between the permission request and the time of permission delivery, the saved man hours in the permission request process and from increased information security as well as cutting the permissions that are not required for completing user’s daily assignments

    Critical infrastructure protection

    Get PDF
    Postgraduate seminar series with a title Critical Infrastructure Protection held at the Department of Military Technology of the National Defence University. This book is a collection of some of talks that were presented in the seminar. The papers address threat intelligence, a protection of critical supply chains, cyber security in the management of an electricity company, and privacy preserving data mining. This set of papers tries to give some insight to current issues of the critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers

    Fossil mammals resolve regional patterns of Eurasian climate change over 20 million years.

    Get PDF
    ABSTRACT Fossil teeth of terrestrial plant-eating mammals offer a new, quasi-quantitative proxy for environmental aridity that resolves previously unseen regional features across the Eurasian continent from 24 to 2 million years ago. The pattern seen prior to 11 million years ago are quite different from today's. Thereafter, a progressively modern rainfall distribution developed at about 7 to 5 million years ago when East Asia remained unexpectedly humid while Europe experienced a transient phase of strong aridity. Mean hypsodonty is a geographically extensive and stratigraphically well-resolved palaeoprecipitation proxy that can be used to constrain the regional details of vegetation and climate models

    Oikeuksien hallintarakenteen uudelleensuunnittelu ja oikeuksien hallinnan automatisointi yrityksessä

    Get PDF
    The thesis studies the structure of permission management system used in a client organization and the ways to make it better and more simplified. The aim is to study what type of structure would best serve the client company and then create a new permission management structure based on the findings of the research. This study introduces the needs for permission management, required components for executing a functional permission management system and the implementation of new more functional permission management structure. To find out the best way to introduce the new structure and how it will improve the permission management in the client organization. Firstly the current structure will be examined. Secondly the existing structure will be remodeled to meet the needs of the client organization and to support role based permission structures. Thirdly the new permission management structure will be implemented as a part of the permission management system. The study results in new permission management structure that can be implemented as a company wide solution for permission management but with little effort can also be used as a basis for enterprise wide solution to permission management. The value of this study comes from the saved time between the permission request and the time of permission delivery, the saved man hours in the permission request process and from increased information security as well as cutting the permissions that are not required for completing user’s daily assignments

    Experiences from development of security audit criteria

    No full text
    Abstract Cyber-attacks have grown in importance to become a matter of national security. A growing number of states and organisations around the world have been developing defensive and offensive capabilities for cyber warfare. Security criteria are important tools for defensive capabilities of critical communications and information systems (CIS). Various criteria have been developed for designing, implementing and auditing CIS. The paper is based on work done from 2008 to 2016 at FICORA, the Finnish Communications Regulatory Authority. FICORA has actively participated in development and usage of three versions of Katakri, the Finnish national security audit criteria. Katakri is a tool for assessing the capability of an organisation to safeguard classified information. While built for governmental security authorities, usefulness for the private sector has been a central design goal of the criteria throughout its development. Experiences were gathered from hundreds of CIS security audits conducted against all versions of Katakri. Feedback has been gathered also from CIS audit target organisations including governmental authorities and the private sector, from other Finnish security authorities, from FICORA’s accredited third party Information Security Inspection Bodies, and from public sources. This paper presents key lessons learnt and discusses recommendations for the design and implementation of security criteria. Security criteria have significant direct impacts on CIS design and implementation. Criteria design is always a trade-off between the varying goals of the target users. Katakri has tried to strike a balance between the different needs for security criteria. The paper recommends that criteria design should stem from a small set of strictly defined use cases. Trying to cover the needs of a wide variety of different use cases quickly renders the criteria useless as an assessment tool. In order to provide sufficient information assurance, security criteria should describe requirements on a reasonably concrete level, but also provide support for the security and risk management processes of the target users

    Preface iii

    No full text
    The community of Semantic Wiki researchers has probably first met at the dinne
    corecore