Sök:

Sökresultat:

195 Uppsatser om Cyber-attack - Sida 3 av 13

Gränser av hud, glänsande kroppar och längtan : En queer närspelning av Mass Effect 3

This essay aims to examine how the synthetic non-human subjects, EDI and Legion, are constituted in terms of their bodies, gender, desire and emotion, in the gaming series Mass Effect. In a close-gaming method I also want to explore in which way the gamer can effect or even change the expressions of the body, gen­der, desire, and emotion made by the synthetic non-human subjects. In order to do this I use Judith Butlers and Sara Ahmeds queer theory, and Donna Haraways cyborg feminism. I concluded that EDI em­braces her embodiments and is given a highly sexualized female body, being more of a woman than a machine. While Legion is rather embracing disembodiment and is given a non sexualized, androgynous male body, be­ing more of a machine than a man.

Överraskning ? Tidlös eller totalt omkastad?

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

Revisorers perspektiv på implementeringen av ett nytt regelverk : ? fallet komponentavskrivningar enligt regelverket K3

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

En IT-forensikers kamp mot IT-brottsligheten : En studie om arbetssätt hos polisens IT-forensiker

The use of information technology (IT) is exploding. Today, it is in our daily routines to use some kind of information technology. The increase of users increases the number of cyber crimes, ie, crimes that in some way involve IT. As the cyber crimes grow in numbers, the workload for technical investigator increases, these are called digital crime investigators. The thesis is about how police digital crime investigators work and what problems they may encounter during an investigation.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Co-branding ur ett konsumentperspektiv : En fallstudie av företaget Sony Ericsson

Syftet med uppsatsen har varit att undersöka hur konsumenterna uppfattar varumärkesutvidgningen. Studien har haft fokus på ett fallföretag, Sony Ericsson samt de varumärken (Walkman och Cyber-shot från Sony) som de använder på deras produkter. Vi har samlat in data med konsumenters uppfattningar om co-branding och deras brukande av produkter ur den kategori där de co-brandade varumärkena finns. Vidare har vi sökt efter förklaringar till huruvida det finns någon koppling mellan användandet av Mp3-spelare och digitalkamera i förhållande till betydelsen av varumärkena. Undersökningen har varit helt webbaserad och samlat in över 200 svar varvid 197 har använts i sammanställningen av enkätsvaren.Vi har använt oss av rådande teorier inom varumärken, varumärkeshantering, varumärkesvärdering och varumärkesfusioner.

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Lyftkraftsberäkning för vingprofiler: Virvelpanelmetoden

The problem presented in this report is that of finding a method to calculate the lift force from a single-element airfoil of arbitrary shape. A number of restrictions are used in order to simplify calculations while retaining reasonable accuracy. The problem is solved for the two-dimensional case only and no finite-wing effects are taken into account. Furthermore, inviscid and incompressible flow is assumed. The method used to solve the problem is the vortex panel method, with vortex singularities distributed over simplified airfoil geometry.

Utrikespolitik och krig : En fallstudie om USA:s invasion av Irak utifrån neoklassisk realism

In this essay i argue that there are three different variables that may be able to control the outcome of certain foreign policy choices. These three variables are External Threats, government division and public opinion. The Essay also tries to identify former president Bush motives behind the 2003 Iraqi War. It is partly argued that the three variables had a certain amount of influence on Bush decision making process. But the main focus lies on the motives behind the attack.

Pearl Harbor, 1941 : En teoriprövande fallstudie av Japans flygstridskrafter under anfallet mot Pearl Harbor

Den 7 december 1941 genomförde japanska flygstridskrafter ett massivt bombanfall mot Pearl Harbor. Intentionen med anfallet var att slå ut den amerikanska Stillahavsflottan och därmed erhålla större inflytanade i Stillahavsområdet. Anfallen riktades huvudsakligen mot amerikanska fartyg som låg vid Pearl Harbors hamn men även flygfält i dess närområde drabbades hårt av den japanska offensiven.Syftet med detta arbete är att, med utgångpunkt från John. A Warden III centrala teorier; tyngdpunkter, fienden som ett system och parallell attack, analysera Japans agerande under attacken mot Pearl Harbor för att därigenom urskilja i vilken utsträckning dessa teorier kan tillämpas på de japanska flygstridskrafterna vid anfallet. Undersökningen syftar även till att utröna om de utvalda teorierna är applicerbara på taktisk nivå.

Modellering av delvis kända objekt med hjälp av bilder

Today many different types of lock systems are used all over the world. Passwords, finger prints and magnetic strips are a few examples. When the key is a three dimensional object, lika a physical metal key, the security depends, in a high degree, on that you can?t copy the object without access to it. One approach to copying the object is photographing the object, and from these photographs create a copy.

<- Föregående sida 3 Nästa sida ->