
Sökresultat:
6493 Uppsatser om Computer science - electronic security - Sida 14 av 433
Peer-to-peer som företagslösning
Problemområde:
Idag är användandet av peer-to-peer (P2P) - applikationer såsom KaZaa, ICQ och
Seti@home utbrett bland privatpersoner. Användningen inom företag är dock ännu
i sin linda.
Vi kommer därför i den här uppsatsen utreda om ett eventuellt införande av P2P-
teknik i ett företagsnätverk ger några fördelar jämfört med en klassisk
Client/Server-lösning.
Hypotes:
Arbetet bygger på hypotesen: ?En P2P-lösning ger fördelar för företaget
jämfört med en Client/Server-lösning?
Genomförande:
För jämförelsen mellan P2P och Client/Server definierades och jämfördes fem
områden: Säkerhet, Användbarhet, Tillgänglighet, Bandbredd samt
Utrustningskrav.
Slutsats:
Inom områdena Användbarhet och Tillgänglighet ger en P2P-lösning klara
fördelar, däremot inom områdena Säkerhet och Bandbredd visar Client/Server-
lösningen istället klara fördelar. Området Utrustningskrav är oavgjort då det
inte
finns någon märkbar skillnad på lösningarna.
Säkerhetsproblemen är P2P-teknologins akilleshäl och det problem som är mest
troligt att stoppa stora investeringar i framtiden om det inte löses.
Slutsatsen av vår jämförelse blir sålunda:
För ett företag som redan har ett existerande Client/Server-nätverk är det inte
någon idé att helt byta system, däremot kan det vara av intresse att
introducera en applikation som möjliggör skapandet av så kallade Virtuella
Nätverk.
För ett helt nytt företag kan skapandet av ett P2P-nätverk vara ett väl så
intressant alternativ till Client/Server.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Den Moderna Webben: Kan HTML5 konkurrera med traditionell programvara?
Vi ser en förändring i hur vi använder applikationer. Från att tidigare varit
associerat till en dator och begränsat till ett par operativsystem finns de
numera överallt. Fler plattformar innebär att man måste utveckla en applikation
till var och en av dessa. Detta gör att utvecklingstiden och kostnaderna ökar
och efterfrågan av crossplattformlösningar i form av webbapplikationer har
därför ökat.
Vi tittar närmare på hur det går att använda sig av HTML5, och övriga tekniker
som en modern webbläsare har integrerat stöd för, för att utveckla webbaserade
applikationer. Vi tar reda på om det finns några hinder eller begränsningar i
detta och om det finns några fördelar i att använda webben som plattform.
Resultatet indikerar att med de nya tekniker som är på ingång kan man utveckla
webbbaserade applikationer med prestanda motsvarande Java eller C#.
En skola för alla : Pedagogers syn på integrering och inkludering av särskoleelever i grundskolan
This study examines the cultural place and status of video and computer games in the Swedish public library. Using works on popular culture and the theories of Pierre Bourdieu, this study employs quantitative methods, as well as textual analysis, to analyze the results of an online questionnaire with 19 questions focusing on selection criteria, shelf placement, perceived competence, as well as reasoning for having or not having these games in the library. 286 out of the 440 libraries contacted is participating in the study, and the libraries consist exclusively of public libraries in Sweden that are found in the database of the Royal Library.The results of this study show that a larger number of libraries than previously indicated have started to provide electronic games to their patrons. At the same time, patterns in the data and comments suggests that these games in many cases still do not enjoy the same level of cultural recognition as other media. Indicative of this is the way most libraries seem to focus on the medium being exclusively for their young patrons, with seem-ingly very little in the way of investment for adults.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Kvinnor, datorspel och identifikation : en genusanalys av två datorspel och två kvinnors datorspelande
This essay covers computer gaming as seen from a perspective of gender theory. The main purpose of the essay is to examine women?s relationship to computer games, and more specifically women?s attitudes to the games they play. The theoretical basis for this essay is sprung from a hermeneutic perspective. The empirical basis for analysis consists of two in depth interviews and game analysis of the two computer games Counter Strike and Final Fantasy XI.
Mobil verksamhetsapplikation för Nationell patientöversikt : Implementation och automatiserad testning av mobil applikation
While the technological infrastructure that enables collaboration between municipalities, counties and private health care providers improves, so does the need for health-care providers to gain access to the right patient journal at the right time. For doctors, nurses and other health-care organization employees this goal is achieved by NPÖ, National Patient Summary. NPÖ effectively enables health-care records to be shared across organizational boundaries. This thesis is based on a demand by a mobile application that can give district nurses access to health-care records wherever they are.This thesis describes the development of a prototype of a mobile application aimed for NPÖ. This includes investigating a suitable mobile platform, investigating available card readers for reading electronic identification from SITHS cards and the ability to connect to external services such as NPÖ.
Interaktion i klassrummet
I den här rapporten beskrivs hur elever mellan åtta och tolv år upplever
användningen av datorn och Internet i skolan. Genom att studera användningen av
Internet med hjälp av intervjuer, deltagande observationer och informella
samtal har författaren i den här rapporten valt att utifrån elevernas
perspektiv beskriva deras situation. Utifrån den etnografiska studie och de
konstruktionistiska teorier författaren gjort utnyttjas sedan erfarenheter från
utbildningstiden för att försökta skapa ett koncept om hur ett framtida
klassrum skulle kunna komma att se ut.
Undersökningar har gjorts om hur information, kunskaper och erfarenheter utbyts
i klassrummet och vilken betydelse det har för användningen av Internet. Men
även hur elevernas själva utvecklas och skapar sig ett kritiskt tänkande och
att lära sig sortera, för dem, relevant information. Jag har även studerat hur
lärarens roll förändras och hur det påverkar undervisningskulturen.
Medicinering inom hemtjänsten
This work has been done by three development engineers and one computer engineer and in some cooperation with the company Phoniro. This report is written for computer science and is mainly oriented on the programming part in the project. The goal has been to develop a program that ensures the quality of the care that the home care organization delivers. The program is developed for cellphones and is supposed to be used in every visit. Several functions have been developed for the reason of reducing mistakes in patient visits, where the focus was on safe medication.
Hur förankras en policy? : En studie av Stockholms stads informationssäkerhet
Culture Management Cultural management administration producent KKE management.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
En actionberättelse : en analys av de narrativa delarna i actiondatorspelet Halo
This essay is a narrative analyze of the computer game Halo. The purpose of the essay is to see what function the narrative elements have in a computer game of the action genre. The analyze is done with a neo-formalistic approach according to the theory of David Bordwell and Kristin Thompson. The choice of game was based on it's positive reviews mentioning the story. The essay tries to give a picture of research in the field and researchers views on narratives and computer games.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..