Sök:

Sökresultat:

444 Uppsatser om Emerging threats - Sida 7 av 30

En Survey av NFC och NFC-Protokoll med Fokus på Säkerhetsaspekterna

Near Field Communication (NFC) is a short range wireless communication technology that enables data exchange between devices. NFC is used in many different areas, from subway tickets to authentication systems. This paper presents possible security threats to Near Field Communication and documented attacks that have been used to target various NFC protocols. Weaknesses in different NFC protocols will be presented and suggestions on how to counter certain weaknesses will be discussed. This survey will be valuable for companies interested in protecting their data when using or planning to use NFC systems..

  ...egentligen har jag väl alla möjligheter... :   -En kvalitativ studie om upplevt handlingsutrymme hos enhetschefer.

 Our study aims at investigating the unit manager?s, within LSS, perceiveddiscretion, when people with Down´s syndrome develop Alzheimer?s disease. We wanted to know what they perceive as limiting factors or facilitators in order to meet changing and/or emerging needs, as well as how they interpret their discretion in relation to this. We have conducted semi-structured qualitative interviews with five unit mangers within LSS.When analyzing the interview material, we have used a theoretical approach from a street-level bureaucracy and from the unit managers? perceiveddiscretion point of view.Our study?s result demonstrate that the unit managers are experiencing a wide discretion and do not feel a need to widen their identifieddiscretion..

Skogsvårdsentreprenörer i norra Norrland 2009 : företagsbeskrivning och analys av kompetensens betydelse för planteringsresultat

The number of silvicultural contractors has significantly increased in the last decades, and among its main clients are the forest companies. The purpose with this study was to describe the contractors that worked with planting in Norrbotten and Västerbotten in 2009 for Holmen Skog, Norra Skogsägarna, SCA Skog and Sveaskog and also examine if there was any correlation between the contractors? competence and the quality in the planting they achieved. A survey was made among 47 contractors with a questionnaire who performed planting for the forestry companies in 2009. 27 contractors answered the questionnaire and 4 representatives of these contracting companies took part in an extensive interview.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Säkerhetsstandard för ett mjukvarubaserat säkerhetselement

Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.

Högre allmänna läroverket i Falun : Ett ordnings- och förteckningsarbete

The text deals with the process of reorganizing and cataloging the archival material emerging from State secondary grammar school in Falun, which appears to have been poorly managed for a number of years. The work was done with consideration to former ways of organizing the material, and a great deal of research was needed in order to establish the outer provenance of the archive.The theoretical discussion goes deeper into the questions of provenance and appraisal in regard to the work,and some choices, especially the decision to reorganize the archive, are motivated with reference to Swedishrules and regulations concerning state authorities' archival management and their duties towards Swedish citizens..

Politisk sekterism i Libanon : En fallstudie av Taif-avtalet och den konsociationella demokratins hållbarhet

Aiming to contribute to the discourse on the sustainability of consociational democracy in plural societies, this case study provides an examination of Lebanon?s power sharing model. The study begins with an evaluation of the Taif Agreement. After acknowledging its effect on Lebanon?s consociational system the function and operation of Lijphart?s four consociational elements are analyzed.

Mobile Operators Future Business Model - Strategic Implications of Emerging Networks

Syftet med uppsatsen är att analysera mobil operatörernas behov att omsätta och värdera sig till de teknologiska förändringar ch marknadsförutsättningar genom att lägga fram alternativa affärsmodeller. Nya nätverk och teknologier håller på att förändra den stabila mobiltelefonimarknaden och därmed branschförhållandena för opertörerna. För att inte tappa marknadsandelar och attrahera nya kunder måste de vara proaktiva i med sina strategier vilket inte är falle idag. Vi har i analysen kommit fram till tre olika affärsmodeller vi anser vara lämpliga att ta i beaktning vid anpassning till de kmmande marknadsförhållandena..

Informationsosäkerhet i en komplex miljö

Syftet med uppsatsen är att skapa förståelse för hur svenska medelstora företag i en föränderlig omgivning hanterar situationer där det krävs information, direktiv och beslut från kinesiska myndigheter. Studien grundar sig på en kvalitativ metod. Vi har genomfört intervjuer med valt fallföretag och utvalda experter. Vidare har litteraturstudier givit oss en teoretisk referensram. Uppsatsen har resulterat i ett praktiskt och ett teoretiskt bidrag.

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

From wheels to walking : exploring an alternative planning approach in Sub-Saharan countries - the case of the Axis in Nairobi, Kenya

Rapid urbanisation is putting strains on both the landscape and the city dwellers and the pressure on planning for sustainable and equitable cities is crucial. As many cities in Sub-Saharan Africa are expanding, city planning has trouble keeping up to meet the needs of the growing amount of urban dwellers. Many cities have also been planned with the cars in focus and the needs and comfort of the pedestrians have been overlooked. The capacity of institutions is limited due to centralized government and bureaucracy, as well as corruption. Planning is erratically implemented and it is difficult to know what will happen.

Människa ? Teknik ? Organisation ur ett utredningsperspektiv : En intervjustudie av medarbetare vid Statens haverikommission

Human - Technology - Organization (HTO) is a well-established, general unifying concept in the Swedish Accident Investigation Authority (SHK) that represents an approach, knowledge and use of various tools regarding interactions between people, technology and organizational factors. The HTO-perspective is well described in literature but there are few studies on how SHKs staff experiences working according to this method in their investigations. The aim of this study was therefore to describe their HTO-perspective, examine how it is used in the investigations at SHK and describe the investigators experience of working with the HTO-perspective as well as the method's usefulness compared to old methods in accident investigations. A literature study has been conducted in the areas of HTO, Theory of planned behavior (TPB) and safety culture. TPB and safety culture are described in this paper since they highlight the different aspects of a HTO-perspective.

Vem bryr sig? : Ett kommunikativt perspektiv på fusionen mellan Växjö Universitet och Högskolan i Kalmar

This essay takes the three models from Allison and Zelikow book Essence of decision and applies them on the Swedish defense system. After the cold war the Swedish defense system had to undergo changes to be a more modern defense and be able to defend Sweden against threats. To also be able to cooperate with other countries in peacekeeping operations the Swedish defense had to be reorganized. The solution was to change direction from a defense system that was organized for invasion to instead be a movable defense ready for any challenge in Sweden or abroad. This reorganization will be analyzed according to the three different models..

<- Föregående sida 7 Nästa sida ->