Sök:

Sökresultat:

2287 Uppsatser om Computer Network Attack - Sida 9 av 153

Att Införa IPv6 i ett IPv4-nätverk

Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted.

How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team

The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.

Pensionären och paddan : En studie av pensionärers upplevelser av läsplattor

Portable IT devices such as laptops, smart phones and computer tablets are becoming ever more ubiquitous. At the same time, the population of the Western world is growing older, with aging bringing about changes with regards to individuals' physical and mental capabilities. These facts raises important questions about how well suited these devices are for use by elderly people. This study focuses on the cognitive aspects of the devices' usability, using the concept of mental models to analyze the users' understanding of a computer tablet. It also draws upon theory of graphical user interfaces in its analyses.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

Analys, design och implementering av Orbit ones dokumenthanteringssystem

This report describes the development of a system for controlling documents. The report starts with a problem description which the company wants an intranet-based solution for. The report then continues to describe the development phase for the different parts of the system which results in a complete system. The company that wanted this system is called Orbit One and is located in Ronneby, Sweden. They have had a problem with old documents circulating in different versions and in different binders. Now thanks to their new system they can access their documents easy and on demand through their intranet..

Är vi artiga mot virtuella agenter?

The CASA-paradigm, Computers Are Social Actors, was introduced in the book "TheMedia Equation" by Reeves and Nass. One of their experiments concluded that we tend to be polite to computers in the same way as we are to people. In this study I have replicated Reeves and Nass experiment but instead of a text-based interface I have used a virtual agentin order to find out if we are polite to the agents, or still to the computer. Two experimental setups was conducted. The two setups had a common first part that was carried out on onecomputer with one agent.

Tillförlitlighet i Stockholms elnät : En analys med hjälp av Tekla NIS

Outages in the electric grid can be costly for society. Because of this, reliability is one of the parameters used to regulate network companies. Reliability in electrical grids can be measured with SAIDI, system average interruption duration index, which for Fortum Distribution has increased in Stockholm?s distribution network (11 kV) in the early 2000?s.By using outage data for Stockholm from 2011-2013, sets of parameters to be used for reliability calculations in the network information program Tekla NIS were derived. Two different options for investment were then analysed: changing old cables with high fault frequencies, and installing automatic switching in distribution substations.

Sensorsystem till hinderhanterande robot

The projects goal is to construct and program a robot that is controlled from a computer but also have an obstacle handling function that allows the robot to navigate around the object by itself.The robot is a simple construction and the number of components and functions is kept at a minimum. A tricycle construction was chosen because it?s the simplest. Communication between the robot and the computer also kept as simple as possible..

Intelligenta Switchar

This master thesis has been carried out on behalf of Stoneridge Electronics AB and is an investigation ofhow intelligent switches can replace the traditionally used direct controlled switches. The concept ofintelligent switches is that the switches contain electronic identification components which, by connectingthem to a network, give the same function independent of the location of the switch. This infers anincreased flexibility and configurability which can be a great advantage in development, production andcustomization in the commercial vehicle industry. Especially in the current situation when commercialvehicle manufacturers provides more and more functions and dashboard configurations.LIN (Local Interconnect Network) is a network protocol introduced in 1999. It is a simpler and lower costcomplement to CAN (Controller Area Network) and is adapted for applications where the demands forbandwidth are lower, for example reading sensors and switchers.

Pratbubblan: den röda tråden : En studie av Karlstads Stadsnäts visuella kommunikation

The purpose of this study is to investigate whether Karlstad City Fiber Network visual elements in the form of a pair of speech bubbles fit into the organization's holistic external communication and branding. The study examines whether Karlstad City Fiber Network image of the organization and the speech bubbles match the stakeholders view and how the visual elements are perceived and recognized by stakeholders. The theory associated with the study is theories of corporate visual identity, image, identity and branding and visual communication. These three elements are important to be aware of when a generation of an effective external communications. Qualitative interviews with employees at Karlstad City Fiber Network and Karlstad municipality has undertaken to give an idea of ??what the organization wants to achieve and what their opinions are.

Utrikespolitik och krig : En fallstudie om USA:s invasion av Irak utifrån neoklassisk realism

In this essay i argue that there are three different variables that may be able to control the outcome of certain foreign policy choices. These three variables are External Threats, government division and public opinion. The Essay also tries to identify former president Bush motives behind the 2003 Iraqi War. It is partly argued that the three variables had a certain amount of influence on Bush decision making process. But the main focus lies on the motives behind the attack.

Pearl Harbor, 1941 : En teoriprövande fallstudie av Japans flygstridskrafter under anfallet mot Pearl Harbor

Den 7 december 1941 genomförde japanska flygstridskrafter ett massivt bombanfall mot Pearl Harbor. Intentionen med anfallet var att slå ut den amerikanska Stillahavsflottan och därmed erhålla större inflytanade i Stillahavsområdet. Anfallen riktades huvudsakligen mot amerikanska fartyg som låg vid Pearl Harbors hamn men även flygfält i dess närområde drabbades hårt av den japanska offensiven.Syftet med detta arbete är att, med utgångpunkt från John. A Warden III centrala teorier; tyngdpunkter, fienden som ett system och parallell attack, analysera Japans agerande under attacken mot Pearl Harbor för att därigenom urskilja i vilken utsträckning dessa teorier kan tillämpas på de japanska flygstridskrafterna vid anfallet. Undersökningen syftar även till att utröna om de utvalda teorierna är applicerbara på taktisk nivå.

Kan Hedvig lösa De mystiska tecknen? : en studie av två biblioteksdataprogram för barn

This thesis examines which function the information technology may have in thechildren's library, with the example from two library computer programmes. One is anexpert system, Hedvig, which will help children to choose and to find books, and theother is a computer game, The mysterious signs, that will teach children library user education.The main question is: What conceptions do the project-leaders, the children'slibrarians and the children have concerning the function of these two programmes in thechildren's library?The study is based upon qualitative interviews with two projects-leaders, fourlibrarians, three computer programmers and twenty-eight children.The theoretical material consists of examples on other library computer programmesfor children developed in Denmark and USA, some American studies in children'sabilities to use computerized information retrieval systems, and studies concerningchildren's relations to computers.The adult's conceptions of the computer programmes are divided into categories asfollows: Democracy, aspect of sex, complement, marketing, reading promotion,development of competence, information technology development, pedagogics, adulteducational activities, compensation and armusement, pedagogics, usefulness,effectiveness and information. These categories shall be seen as the conclusions of the thesis..

Familjen är den enda vägen tillbaka hem. : En kvalitativ studie om personalens syn på familjens delaktighet i behandling av ungdomar.

ÖREBRO UNIVERSITYDepartment of Behavioural, Social and Legal SciencesProgram of social workSocial Work CC-essay in Social Work, 15 creditsAutumn term 2013The family is the only way back home? A qualitative study on staff?s view on family involvement in the treatment of adolescentsAuthors: Cakici, Nahrin and Claesson, SandraAbstractThe aim of this study is to investigate how the staff at residential treatment centers works to involve the family and the social network in youth?s treatment and how they experience that the involvement affects the young person. The aim is also to study the difficulties the staff experience in their work to involve the family and the social network. In this study, staff from two residential treatment centers in Sweden participated. The study is conducted based in on qualitative method in which four semi-structured telephone interviews and one group interview have been conducted.

Modellering av delvis kända objekt med hjälp av bilder

Today many different types of lock systems are used all over the world. Passwords, finger prints and magnetic strips are a few examples. When the key is a three dimensional object, lika a physical metal key, the security depends, in a high degree, on that you can?t copy the object without access to it. One approach to copying the object is photographing the object, and from these photographs create a copy.

<- Föregående sida 9 Nästa sida ->