Sökresultat:
1329 Uppsatser om Military security - Sida 7 av 89
Militära och civila uppfattningar om svenska militärer och deras medverkan i internationella insatser
With the starting point in UN peacekeeping operations, this essay investigates the participation of the Swedish armed forces and how the Swedish soldiers perceive their role in those operations. The aim of the study was to explore different perceptions about the Swedish soldiers in international operations. Partly from the Swedish soldiers perspective and how they perceived their own role as soldiers. Partly from the perspective of civilians, like Swedish aid workers, and how they perceive the Swedish soldiers. The third perspective was from a person with mixed experiences from both the military and the civilian work.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Nekande tvångsmakt i Operation Unified Protector
There are several competing views on how to best utilize air power. Following his quantitative study of air power, Robert Pape developed a theory which focuses on undermining the target state's military strategy. According to Pape it is possible to explain the outcome as a result of military vulnerability. This essay seeks to determine if Pape's theory can predict the outcome of Operation Unified Protector. By using a mixed methods approach on four hypotheses, it will be determined if the operation was a successful case of coercion, if NATO acted according to Pape's model and whether this achieved the desired effects or not. The results reveal that the theory could not successfully predict the outcome of the conflict.
Rysk-georgiska kriget : Rysk maskirovka eller georgisk rundgång?
This essay aims to analyse if the Russian military operation carried out against Georgia between the 7th and 12th of august 2008 were executed with adherence to the Russian principles for military deception, maskirovka. A superior purpose is to assess the situation according to the Swedish Armed Forces task of identifying possible needs for new or changed needs for abilities and competence. The method used is two-alternative hypotheses which are tried by comparing actual events before and during the Russian-Georgian war with the ten methods of maskirovka, compiled from military analytical literature. Such traces of resemblance are further examined, both individually and as a part of a larger indication. Further the essay describes the Russian art of war, the prerequisites for military surprise, information warfare in Russian doctrine, the disputed territories of South Ossetia and Abkhazia and the principles for maskirovka. The conclusion is that the Russian operation was executed with some adherence to maskirovka, though unspecified of to what degree. Author of this essay is Cadet Martin Svensson of the Swedish Army, currently a student at the Armed Forces Technical School in Halmstad..
Revisorers perspektiv på implementeringen av ett nytt regelverk : ? fallet komponentavskrivningar enligt regelverket K3
This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
Pust och stånk! Meen vad roligt vi hade när vi fick igång det. : En diskurspsykologisk studie av personals samtal om barns delaktighet i dokumentationsprocessen på förskolan.
There are several competing views on how to best utilize air power. Following his quantitative study of air power, Robert Pape developed a theory which focuses on undermining the target state's military strategy. According to Pape it is possible to explain the outcome as a result of military vulnerability. This essay seeks to determine if Pape's theory can predict the outcome of Operation Unified Protector. By using a mixed methods approach on four hypotheses, it will be determined if the operation was a successful case of coercion, if NATO acted according to Pape's model and whether this achieved the desired effects or not. The results reveal that the theory could not successfully predict the outcome of the conflict.
Nordiskt försvarssamarbete i åtstramningens tidevarv : En studie av förutsättningar för det norsk-svenska försvarssamarbetet
This study uses European researcher Tomas Valasek?s hypothesis about factors required for defence cooperation in order to achieve conditions which can be successfully applied to the Nordic defence cooperation NORDEFCO. The study uses only Norway and Sweden on the grounds that they are the original actors and the driving forces behind the defence cooperation. The factors studied are; the countries' strategic culture, solidarity and trust between countries, similarity in military forces, if similar conditions prevail in the defence industry and if the intentions of cooperation have been clarified.Mainly government documents in the form of propositions, orientations and defence documents are studied, together with previous research in this area and, especially, interviews with representatives of NORDEFCO at military level and policy level as well as outside perspectives from the military attachés in each country. With the intention of studying the extent to which the factors Valasek features may prove to be significant in assessing the conditions for enhanced cooperation in NORDEFCO, the study raises the question of how it is possible to find expressions for the factors.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
NATO:s misslyckande att undvika civila dödsfall i Libyen 2011
This study revolves around the NATO-led Operation Unified Protector in Libya 2011. The military campaign was executed under a UN mandate to protect the Libyan civilian population. Despite the mandate civilians died because of NATO bombings. The purpose of this study is to identify inadequate measures in avoiding civilian casualties during the operation and to continue to work towards minimizing civilian casualties caused by military organizations in international interventions.Early in the operation, NATO?s objective altered from protecting the civilians to overthrowing the Libyan regime. At the same time NATO changed its military targeting.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.