Sökresultat:
28 Uppsatser om Intrusion - Sida 1 av 2
Ersättning för markåtkomst avseende tredimensionellt (tunnel) intrång i fastighet
Chapter 1. 1 § jordabalken (1970:994) defines property as land that includes area, which is divided into properties.A three-dimensional property must be firm with a closed volume where top and bottom are specified. The property boundaries are described clearly according to Chapter 4. § 27 fastighetsbildningslagen. A three-dimensional property can undermine a traditional property, as well as a three-dimensional property.
Saltvattenpåverkan i enskilda brunnar i kustnära områden : En undersökning av grundvattenförhållandena och riskerna för saltvattenpåverkan i S:t Annas skärgård, Östergötland
Coastal areas are popular for housing, both for permanent living and holiday houses. At the same time, thin sediments and small storage capacity in the bedrock makes the ground water resources limited. The limited ground water resources combined with too large withdrawals of ground water makes salt water Intrusion a problem in many coastal areas. This study examine the risk of salt water Intrusion in drinking water supplying wells on the island Södra Finnö in S:t Anna archipelago, Östergötland, Sweden. A calculation of the relation between ground water recharge and withdrawal is obtained to analyze the ground water balance in the area.
Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet.I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket.Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt.
PTSD-symptom och dess relation till trauma
Personer som genomgått en traumatisk händelse befinner sig i riskzonen för att utveckla post-traumatic stress disorder (PTSD), som innebär en stor livsbegränsning och ett stort lidande. Dagligen möter hälso- och sjukvårdspersonal personer som ännu ej diagnostiserats och det är därför av vikt att kunna identifiera PTSD-symptom. Syftet med litteraturstudien var att undersöka samband mellan olika trauman och PTSD-symptom enligt diagnostiseringssystemet DSM IV. Studien grundades på en deduktiv ansats och resultatet bestod av 15 vetenskapliga artiklar som granskades. Resultatet behandlade DSM IV:s tre symptomkluster: re-experience/Intrusion, avoidance och hyperarousal.
Fuktskador i ytterväggar på grund av vattenintrång
Moisture damage in buildings is a serious issue that leads to problematic consequences and high economic costs. Despite the knowledge and awareness existing about moisture problems, extensive damager still occurs today. Studies of moisture in the exterior wall constructions shows that the issue if often caused by rain and water Intrusion. These kinds of problem result in major costs usually because the companies have to replace the material and structural components and also in some cases tear down large parts of the buildings.The work includes moisture theory and descriptions of four different exterior wall constructions, wood stud wall with plastered facade, exterior wall with wood facade, exterior wall with concrete, and exterior wall with brick facade. Our thesis work describes how the constructions are affected and moisture damage due to water Intrusion.
Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup
Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks..
Kontext, utvärdering och användarupplevelse : En studie om kontextens påverkan på användarnas respons vid utvärdering av användarupplevelse
In this paper we explore the relations between context and feedback generated in three user-centered evaluations of a flash-based game. Whether it?s the social context, the physical context or the degree of Intrusion from the evaluator, they all contribute to the quality of the feedback received. The selection of test subjects is a narrow process, which gives the above mentioned factors different meaning. Contextual factors have shown to influence the feedback given within both usability and user-experience.
IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter
The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.
M?ns r?tt till skydd av privatliv mot kvinnors r?tt till skydd mot v?ld - Kampen om skyddet
The purpose of the essay is to investigate how the position of women and girls in society can lead to a valid infringement of the right to privacy (art. 8 ECHR) by allowing the storage of personal data belonging to people who have not been convicted of a crime. The essay uses the traditional legal method to determine the applicable law, but is also grounded in a feminist approach in order to enable an interaction between jurisprudence and societal phenomena. The essay revolves around Directive 2016/680 and relevant case law in order to analyze the set requirements to enable an infringement of the right to privacy. In order to be able to analyze whether the requirements can be met based on the need to prevent men?s violence against women and girls, the essay will also describe the life situations of women and girls in society.
The essay argues that the conditions at hand fall under art.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT The main purpose of IT security policies is to protect companies against Intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Personlig integritet och kreditupplysning
Most people would agree that privacy is a civil right, and that we should not be deprived of this civil right for other than legitimate reasons. The difficulty lies instead in how to decide where the legislative boundary should be drawn for the right to privacy, in order to protect the individual from an undue Intrusion of his privacy. There are a number of areas where the right to privacy comes in conflict with opposite interests. One of these areas is credit report. In this master thesis the author discusses questions as, what is the meaning of the word privacy, and whether the protection of privacy is sufficient in the legislation concerning credit report? Also a comparative study of the Swedish and the English regulation is performed.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT
The main purpose of IT security policies is to protect companies against
Intrusion and unwanted spread of information. Statistics show that IT related
crimes tend to increase and because of that it is important, from the company?s
side of view, to be well prepared. The IT security policy is an important part
of that preparation.
A lot of the crimes related to IT can be deduced indirectly to employees at the
companies where the crime takes place.
Konstruktion rörklammer
This report describes the development process of a pipe clamp used on exhaust system for cars. It is made based on the manufacturers desire to improve and make the clamp easier to manufacture and to reduce its price to their customers. This should be done either by manufacturing the clamp in one piece without an expensive and work intensive welding process, or by generating ideas of how to develop a brand new type of clamp. Investigating the market for similar products was done to eliminate Intrusion of other manufacturers? patents but also to generate ideas.