{"id":23,"date":"2024-04-04T03:42:26","date_gmt":"2024-04-04T00:42:26","guid":{"rendered":"https:\/\/sisu.ut.ee\/nutiturva\/allikad-vene\/"},"modified":"2024-04-04T03:42:45","modified_gmt":"2024-04-04T00:42:45","slug":"allikad-vene","status":"publish","type":"page","link":"https:\/\/sisu.ut.ee\/nutiturva\/allikad-vene\/","title":{"rendered":"\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438"},"content":{"rendered":"<p>Anderson, M., &amp; Olmstead, K. (15.03.2017).\u00a0<em>Many smartphone owners don\u2019t take steps to secure their devices<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Pew Research Center:\u00a0<a href=\"http:\/\/www.pewresearch.org\/fact-tank\/2017\/03\/15\/many-smartphone-owners-dont-take-steps-to-secure-their-devices\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.pewresearch.org\/fact-tank\/2017\/03\/15\/many-smartphone-owners-dont-take-steps-to-secure-their-devices\/<\/a><\/p>\n<p>Anise, O. (22.03.2017.a.).\u00a0<em>Looking Back at Android Security in 2016<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f:\u00a02.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Duo Labs:\u00a0<a href=\"https:\/\/duo.com\/blog\/looking-back-at-android-in-2016\" target=\"_blank\" rel=\"noopener\">https:\/\/duo.com\/blog\/looking-back-at-android-in-2016<\/a><\/p>\n<p>Apple. (19.09.2017).\u00a0<em>Set up Find My iPhone on all of your devices<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Apple:\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT205362\" target=\"_blank\" rel=\"noopener\">https:\/\/support.apple.com\/en-us\/HT205362<\/a><\/p>\n<p>Armis. (\u0434\u0430\u0442\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0432\u0443\u0435\u0442).\u00a0<em>The Attack Vector \u201cBlueBorne\u201d Exposes Almost Every Connected Device<\/em>.\u00a0\u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f:\u00a0 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Armis:\u00a0<a href=\"https:\/\/www.armis.com\/blueborne\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.armis.com\/blueborne\/<\/a><\/p>\n<p>AV-TEST. (\u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c 2017).\u00a0<em>The best antivirus software for Android<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.09.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a AV-TEST:\u00a0<a href=\"https:\/\/www.av-test.org\/en\/antivirus\/mobile-devices\/android\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.av-test.org\/en\/antivirus\/mobile-devices\/android\/<\/a><\/p>\n<p>Buldas, A. (\u0434\u0430\u0442\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442). \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, allikas\u00a0<a href=\"https:\/\/home.cyber.ee\/~ahtbu\/aturve_1.ppt\" target=\"_blank\" rel=\"noopener\">https:\/\/home.cyber.ee\/~ahtbu\/aturve_1.ppt<\/a><\/p>\n<p>Cybernetica AS. (2017). \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.09.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Andmekaitse ja infoturbe leksikon:\u00a0<a href=\"http:\/\/akit.cyber.ee\/\" target=\"_blank\" rel=\"noopener\">http:\/\/akit.cyber.ee\/<\/a><\/p>\n<p>Eddy, M. (17.09.2017).\u00a0<em>Protect Yourself With a Free VPN Service<\/em>.\u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f:\u00a0 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a PCMag:\u00a0<a href=\"https:\/\/www.pcmag.com\/roundup\/285788\/the-best-free-vpn-services\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pcmag.com\/roundup\/285788\/the-best-free-vpn-services<\/a><\/p>\n<p>Eddy, M. (17.09.2017).\u00a0<em>The Best VPN Services of 2017<\/em>.\u00a0\u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f:\u00a0 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u00a0 PCMag:\u00a0<a href=\"https:\/\/www.pcmag.com\/article2\/0,2817,2403388,00.asp\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pcmag.com\/article2\/0,2817,2403388,00.asp<\/a><\/p>\n<p>Goodin, D. (15.03.2016).\u00a0<em>Big-name sites hit by rash of malicious ads spreading crypto ransomware<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f:\u00a02.10.2017, \u0438\u0441\u043e\u0447\u043d\u0438\u043a Ars Technica:\u00a0<a href=\"https:\/\/arstechnica.com\/information-technology\/2016\/03\/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware\/\" target=\"_blank\" rel=\"noopener\">https:\/\/arstechnica.com\/information-technology\/2016\/03\/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware\/<\/a><\/p>\n<p>Google. (2. 09.2017).\u00a0<em>Google Photos<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Google:\u00a0<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.photos&amp;hl=et\" target=\"_blank\" rel=\"noopener\">https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.photos&amp;hl=et<\/a><\/p>\n<p>Google. (\u0434\u0430\u0442\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442).\u00a0<em>Find, lock, or erase a lost Android device<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Google:\u00a0<a href=\"https:\/\/support.google.com\/accounts\/answer\/6160491?hl=en\" target=\"_blank\" rel=\"noopener\">https:\/\/support.google.com\/accounts\/answer\/6160491?hl=en<\/a><\/p>\n<p>Google. (\u0434\u0430\u0442\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442).\u00a0<em>Laadige alla Google Drive<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Google:\u00a0<a href=\"https:\/\/www.google.com\/drive\/download\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.google.com\/drive\/download\/<\/a><\/p>\n<p>Google. (\u0434\u0430\u0442\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442).\u00a0<em>Olge valmis kaotsil\u00e4inud Android-seadme leidmiseks<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Google:\u00a0<a href=\"https:\/\/support.google.com\/accounts\/answer\/3265955?hl=et\" target=\"_blank\" rel=\"noopener\">https:\/\/support.google.com\/accounts\/answer\/3265955?hl=et<\/a><\/p>\n<p>Hansson, Leego &amp; Partner O\u00dc. (2013). K\u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u00a0<a href=\"https:\/\/www.innovatsioonikeskus.ee\/sites\/default\/files\/IT%20juhtimine\/ITjuhtimiseHeadTavadII2013.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.innovatsioonikeskus.ee\/sites\/default\/files\/IT%20juhtimine\/ITjuhtimiseHeadTavadII2013.pdf<\/a><\/p>\n<p>Kirna, A. (25. 04.2011).\u00a0<em>\u00d5ngitsemine<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Arvutikaitse:\u00a0<a href=\"http:\/\/www.arvutikaitse.ee\/arvutikaitse-algtoed\/ongitsemine\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.arvutikaitse.ee\/arvutikaitse-algtoed\/ongitsemine\/<\/a><\/p>\n<p>Ludwig, A., &amp; Miller, M. (22.03.2017).\u00a0<em>Diverse protections for a diverse ecosystem: Android Security 2016 Year in Review<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Google Security Blog:\u00a0<a href=\"https:\/\/security.googleblog.com\/2017\/03\/diverse-protections-for-diverse.html\" target=\"_blank\" rel=\"noopener\">https:\/\/security.googleblog.com\/2017\/03\/diverse-protections-for-diverse.html<\/a><\/p>\n<p>Microsoft. (10.09.2016).\u00a0<em>Windows Phone 7<\/em>.\u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Microsoft:\u00a0<a href=\"https:\/\/support.microsoft.com\/et-ee\/help\/11696\/windows-phone-7\" target=\"_blank\" rel=\"noopener\">https:\/\/support.microsoft.com\/et-ee\/help\/11696\/windows-phone-7<\/a><\/p>\n<p>Reinu, R. (14.11.2014).\u00a0<em>Sissejuhatus infoturbe haldusesse.<\/em>\u00a0\u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u00a0<a href=\"https:\/\/www.ria.ee\/public\/Programm\/Infoturbe_materjalid_2014\/Sissejuhatus_infoturbesse_141114.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ria.ee\/public\/Programm\/Infoturbe_materjalid_2014\/Sissejuhatus_infoturbesse_141114.pdf<\/a><\/p>\n<p>Statista. (2017). Global mobile OS market share in sales to end users from 1st quarter 2009 to 1st quarter 2017. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f : 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Statista:\u00a0<a href=\"https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems\/<\/a><\/p>\n<p>UK Ministerial department Home Office. (23.03.2016).\u00a0<em>Reducing mobile phone theft and improving security: paper 2<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.09.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a GOV.UK:\u00a0<a href=\"https:\/\/www.gov.uk\/government\/publications\/reducing-mobile-phone-theft-and-improving-security-paper-2\" target=\"_blank\" rel=\"noopener\">https:\/\/www.gov.uk\/government\/publications\/reducing-mobile-phone-theft-and-improving-security-paper-2<\/a><\/p>\n<p>Veldre, A. (30.06.2017).\u00a0<em>K\u00f5ik pole kuld, mis seinal hiilgab<\/em>. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a RIA blogi:\u00a0<a href=\"https:\/\/blog.ria.ee\/koik-pole-kuld-mis-seinal-hiilgab\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ria.ee\/koik-pole-kuld-mis-seinal-hiilgab\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anderson, M., &amp; Olmstead, K. (15.03.2017).\u00a0Many smartphone owners don\u2019t take steps to secure their devices. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 2.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Pew Research Center:\u00a0http:\/\/www.pewresearch.org\/fact-tank\/2017\/03\/15\/many-smartphone-owners-dont-take-steps-to-secure-their-devices\/ Anise, O. (22.03.2017.a.).\u00a0Looking Back at Android Security in 2016. \u0414\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f:\u00a02.10.2017, \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a Duo Labs:\u00a0https:\/\/duo.com\/blog\/looking-back-at-android-in-2016 Apple. (19.09.2017).\u00a0Set up Find &#8230;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-23","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/pages\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":1,"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/pages\/23\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/pages\/23\/revisions\/140"}],"wp:attachment":[{"href":"https:\/\/sisu.ut.ee\/nutiturva\/wp-json\/wp\/v2\/media?parent=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}