Sök:

Sökresultat:

1329 Uppsatser om Military security - Sida 12 av 89

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas

Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.

I skuggan av Preussen : Svenska officerares studieresor till Frankrike före första världskriget

In the decades leading up to the First World War, the Swedish army (as the rest of Swedish society) was greatly influenced by Germany (i.e. subject primarily to Prussian military influence). German equipment was purchased and German training methods and ways of organizing military units were copied. Apart from such easily discernible traces of German influence, the Swedish officer corps - according to earlier research - harboured sympathies for Germany and the German Army. But did the German influences, and the sympathies for Germany, also result in a professional bias ? i.e.

NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan

The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.

RMA - framtidens lösning eller en lösning för framtiden? : RMA - en ny syn på utnyttjandet av militära medel som kräver anpassningsåtgärder på dagens moderna förbandstyper?

The last two decades have changed the society from the Industrial Age to the Information Age. The technological development, especially in IT, has caused a ?Revolution in Military Affairs?. However; how big are the changes RMA will give, or will it even change the foundation of the Art of War and if so, in what way?RMA has three cornerstones DBA, DS and PE all closely integrated in an NCW-concept.

Säkerheten i trådlösa nätverk

The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.

USA:s officiella säkerhetsstrategi : Vad ligger bakom?

The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.

Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism

Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.

Successiv avtalsbundenhet : En beskrivning av modellen och dess närvaro i svensk rättspraxis

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Kadetter på väg mot examen : Är de motiverade till fortsatt anställning i Försvarsmakten?

This paper is about the different parts within the officers training that motivate the cadets to continue their employment within the armed forces after graduation, it also brings up the different parts that influences their motivation in a negative way. Six cadets from the 2011 class at the military academy at Karlberg have been interview in order to give their view on the following seven themes; reasons to take employment, collegiate attitude, comfort, study motivation, perceived education quality, the regiment and career. The responses have then been compared to the previous research at a cadet level which have been scarce. The result followed the previous findings about conscript?s motivation to continue their career and officers to end theirs.

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

Ödesstund för Europa : Om de geopolitiska konsekvenserna av Europas beroende av rysk energi

This is a tale about energy and power. It describes the geographer Halford Mackinder?s geopolitical theories and compares them with current views outlined by Zbigniew Brzezinski and Michael T Klare, among others. With a critical approach it also provides a historical account of a Europe that stands in front of an energy struggle so severe that the current world order seems destined to fall. Oil and natural gas, has since the beginning of the 20th century, been used as a geopolitical tool in order to create dependence, control and even sometimes overthrow empires.

Strategisk bombning i cyberspace

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

WHITE HOUSE/GREEN HOUSE - En processpårande undersökning av klimatfrågan i USA

This thesis examines the process of securitization of the environmental issue in the United States. By using the theories of sectoral security and securitization by Barry Buzan and Ole Waever, commonly known as the Copenhagen school we go beyond the traditional security frames and examine where the environmental issue in the United States stand today within the securitization spectrum. The securitizing spectrum includes three levels in which an issue can be place: non-politicised, politicised and securitized.The problem, which we wish to address, is if there is a movement of the environmental issue in the United States towards becoming a securitized issue. In the light of these circumstances we also wish to explore who is behind the movement and also find out where the issue stand today. We do believe that Al Gore is a securitizing actor and examine his role in the movement of the environmental issueWe have come to the conclusion that there is an ongoing process of securitization in which the environmental issue have moved from being politicised to becoming securitized..

<- Föregående sida 12 Nästa sida ->