Sök:

Sökresultat:

2286 Uppsatser om Computer Network Attack - Sida 1 av 153

Implementation av Network Admission Control

This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don?t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers.

Computer Network Attack som olovligt våld : en fråga om association, effekt, aktör och mål

I Estland 2007 utbröt vad som kommit att kallas ?Cyberwar I?, vari ett stort antal centrala myndigheters, tillika finansiella institutioners servrar attackerades av massiva så kallade Computer Network Attacks (CNA), utfört av framförallt ryska aktörer. Estland protesterade högljutt, men frågan huruvida CNA är att beteckna som olovligt är allt annat än klar. Prövningen sker mot den folkrättsliga regimen Jus ad Bellum, och huruvida metoden uppfyller vissa centrala begrepp. Men hur skall denna regim appliceras CNA?De frågeställningar som avses besvaras är: hur kan CNA utgöra våld eller hot om våld i enlighet med FN-stadgans artikel 2(4) samt hur kan CNA utgöra väpnat angrepp i enlighet med FN-stadgans artikel 51? Detta avses göras genom en studie inbegripande flertalet folkrättsliga experters teorier på området CNA och våldsanvändning, samt applicering av desamma på en fallstudie av händelserna i Estland 2007.Sammanfattningsvis konstateras att flertalet variabler har bärighet i hur CNA kan uppfylla artiklarnas centrala begrepp, vari frågan om association, effekt, aktör och mål tydligast faller ut.

Brandväggar för hemmakontor

Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable.

BSR Prestandaverktyg / BSR Performance tool : Prestandamätning via diagnosuttag över CAN / Performance measure via diagnostic socket over CAN

 This abstract describes the bachelor degree thesis in computer technology at Växjö University. The company BSR in Växjö has requested an application that can measure a cars performance, with attributes like acceleration times and engine power estimation. The communication between car and computer is via the USB port on the computer and the OBD-II socket on the car with the network protocol CAN, controller area network. Cars from VAG have been the primary focus group and the application has been tested on a Volkswagen Passat CC from 2009. The system is developed in the programming language C# in the environment Visual Studio with the framework .NET.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Karakterisering av bioslam för modellering av biogasproduktion

The report aims to investigate how well a certain type of affordable embedded single board computer can hold up against today's more expensive computers in a computer system by doing various tests on a system with the specified requirements. The system has a Raspberry Pi as the single board computer which task is to control a camera based on coordinates obtained from a server as well as capture and stream a video signal on a network.The researches were conducted to check how much network traffic a single-chip computer sent in different video formats and how much CPU utilization was required. Studies were also made to ensure the accuracy of the camera control. The researches have been experimental, where several tests have been performed and analyzed.The results show that a sufficiently good accuracy can be obtained from the camera steering unit, in which two different servos have been investigated. When the video format MJPEG and H.264 are used, the single-chip computer is able to transmit a video signal up to 1280x720 at 15 fps.

Prestanda och precision pa? en enkortsdator i ett system med realtidskrav

The report aims to investigate how well a certain type of affordable embedded single board computer can hold up against today's more expensive computers in a computer system by doing various tests on a system with the specified requirements. The system has a Raspberry Pi as the single board computer which task is to control a camera based on coordinates obtained from a server as well as capture and stream a video signal on a network.The researches were conducted to check how much network traffic a single-chip computer sent in different video formats and how much CPU utilization was required. Studies were also made to ensure the accuracy of the camera control. The researches have been experimental, where several tests have been performed and analyzed.The results show that a sufficiently good accuracy can be obtained from the camera steering unit, in which two different servos have been investigated. When the video format MJPEG and H.264 are used, the single-chip computer is able to transmit a video signal up to 1280x720 at 15 fps.

Värdeskapande i nätverk

The purpose of this thesis is to examine value creation in networks. Based on a case study of Livebookings Network, an online booking service. This thesis has an explorative nature. As a theoretical framework we use theories on value and network dynamics. By combining these theories we develop an operationalized framework that we use to analyze our empirical findings.

Quality of Service i IP-nätverk

The original promise behind the Internet Protocol was to deliver data from a sender to the receiver using a best-effort approach. This means that the protocol makes no guarantees except that it will try to deliver the data to the destination. If some problem occurs the packet may be discarded by the network without any notice. No guarantees are made regarding the time it takes to deliver the data, the rate at which data will be delivered or if data is delivered in the same order it was sent. The best-effort approach is arguably the reason behind the success of the Internet Protocol and is what makes IP scalable to networks the size of the Internet.

En laptop till varje elev : en studie om gymnasieskolans satsning på datorer i undervisningen

The aim of this study is to highlight the computer as a learning resource in the education and give us knowledge about how the students uses the computer in year one in a selected High School where one computer per student were introduced in autumn 2011. The aim is also to contribute to the discussion about how the computer can become a natural learning resource for all students in all subjects, including the students in need of special support.How are the High School students using the computer?Are there differences in computer use, whether the student is in academic or vocational program?Are there differences in computer use between boys and girls?Do the student experience that the digital competence is increasing together with if they experience the computer as aid?In what degree do the teachers encourage the students to use the computer?How much do the students use the computer to learn mathematic?The study is based on a survey of all students in year one in a municipal High School.The result of the study is showing that the students first of all use the computer to play music, surf the Internet and to be logged in on social media (eg. Facebook). The students have learned to use the computer for the tasks they need, although the teachers don?t encourage the students to use the computer in any higher means, not in mathematics and not in other subjects.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

DNS prestanda

Use of computers and computer networks is nowadays a part of everyday life. You do not use them only at home when you sit at you computer, but you can use them all the time everywhere. This can involve everything from surf to any website when you are at home, to checking your email on your mobile when you are on your way to work. Most people do not think about how it really works when they try to access a web page by typing the address into their browser, but something that most people probably notice is how long it can sometimes take to access a web page.All items which are directly connected to the IP network have a unique IP address that is used to make it possible to communicate. The IP address is either a period separated sequence of digits representing 32 bits or a colon separated sequence of digits representing 128 bits, depending on whether the address is an IPv4 or IPv6 address.

Betydelsen av ett fritidsintresse : Fotboll som prevention och identitetsskapande för unga

This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.

"Fröken säger hur man ska vara". : Om barns empatiutveckling och värdegrundsarbete i förskoleklass.

This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.

1 Nästa sida ->