
Sökresultat:
1941 Uppsatser om Network security and countermeasures - Sida 13 av 130
Kommunikationslösningar i molnet : Examensarbete angående olika nätverkslösningar i WAN
Att koppla samman nätverk över geografiskt olika platser har blivit allt vanligare i dagens samhälle. Rapporten kommer belysa olika WAN-lösningar för att göra detta möjligt. De olika lösningar som kommer belysas i denna rapport är att hyra egen fiber, lager2-länk, MPLS och även VPN. Det kommer göras jämförelser mellan dessa lösningar när det gäller kostnad, säkerhet, hastighet och tillförlitlighet. Detta har gjorts med vetenskapliga artiklar och intervjuer men rapporten innefattar även en praktisk tillämpling i form av ett experiment..
"Ett artigt pennekrig" En biografisk studie av Gustaf Montgomerys nätverk och författarskap under en period av ideologisk förändring och nya roller för författare 1812-1842
Studies of networks, fields and of communicative circulations complement each other. This master thesis is a biographical study of an author and journalist, Gustaf Montgomery GM, his network in Sweden of the early 19th century, and a study of his authorship and literary career. The starting-point of the study is GM:s change of field from the conservative to the liberal in 1832. The aim is to give explanations to this change and to describe how the change in turn effected the network. The method used is critical of sources.
Hantering av QoS i Distribuerade MPEG-videosystem
With the advance in computer and network technologies, multimedia systems and Internet applications are becoming more popular. As broadband network is prevailing, more clients are able to watch streaming videos or to play multimedia data over the Internet in real-time. Consequently, there is an increasing demand in the Internet for streaming video systems. As the run-time environment of such applications tends to be dynamic, it is imperative to handle transient overloads effectively. The goal of this work is to develop an algorithm that would provide a robust and controlled behavior of the video system so that important data is delivered on time to the video clients.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
VARN Ett nätverksbaserat 2D-actionmultiplayerspel skrivet i Java.
VARN A network multiplayer 2D action game written in Java. All games that support any form of play across networks is in one way or another affected by the delay, or "ping", that occurs from the time it takes for information to travel over the wires. Not only does it take time, it varies depending on how far away the connected partner is and the current status of the network you are on. Through the years a lot of different methods have been developed to combat these delays. I have reviewed some of these methods and implemented a synchronization system in Java meant to be used in online action multiplayer games..
"Snipp snap snut, nu tog tiden slut" : En analys av användares medvetenhet kring integritet på mobilapplikationer
This study focuses on the integrity of students at Uppsala University that has used the university?s network, UpUnet. We?ve studied their opinions with the use of questionnaires that cover questions related to privacy and awareness about logging of data traffic.The results showed that more students than our hypothesis suggested were unaware of the surveillance on the network, and the majority of these also had a negative opinion towards logging of data traffic. However, we found that there were several relations between how the students responded on our questionnaire, and we?ve presented these in the analysis chapter towards the end of the essay..
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Access to the market - a question of collaboration?
When contemplating entering an alliance the rationale behind the decision should differ
depending on the size of the companies involved as well as on other important factors. The important
factors influencing the decision are related to the resource pooling potential of the alliance,
the power structure along with the business network the companies are a part of. The
analysis has shown proof of a need for cooperation if one wish to succeed in the telecommunication
industry and it has also determined which resources that are deemed to be most important to
get in touch with, for our study object, to facilitate its access to the market. Those resources are
defined as a direct channel to the customer, funds/capital and the access to relevant business
networks. To get in touch with these lacking resources, three alternative approaches has been
proposed; all of them involving a strategic alliance decision.
Relationers påverkan på destinationsvarumärken : En fallstudie av två destinationers turismnätverk
The purpose with our study is to create an understanding of how tourism stakeholders within a tourism network can affect a Destination Marketing/Management Organization?s (DMO?s) work with the destination branding process. To fulfill this purpose we have clarified different relationships that can influence the DMO?s place marketing. In order to limit our study we have chosen to focus on two Swedish destinations, Öland and Norrköping, and their DMO?s.
Revisorns yrkesroll ? Är myntets två sidor verkligen åtskilda?
The name of the thesis is?Istheprintedbook?sdeaththeauthorsbread??Astudyinhowthepublishinghouses?andtheauthors?relationshipschangeduetotheintroductionofthee--?book?Thee--?book,whichisadigitalcopyoftheprintedbook,hasbeenonthemarketforovertwodecades.However,itisnotuntilnowthatchangesarehappeningwithintheindustry,whichaffectsthedifferentactors.Amazonhasforexamplelaunchedane--?readerbythenameKindleonthemarketandApplehaslaunchedasurfpadbythenameiPad,bothwhichyouareabletoreade--?bookson.Thetechnologicalchangesthatarehappeningaffecttheactorswithinthebookindustryaswellasthestructureoftheindustry.Theresearchquestionofthisthesisis?owdothepublishinghouses?andtheauthors?relationshipswithinthebookindustrychangeduetotheintroductionofthee--?book??Actor--?networktheoryisusedtoinvestigatethis.Thetheoryincludesbothhumanandnon--?humanactors,whichtogethercancreateanetwork.Theactorswithinthenetworkconnectthemselvestoeachotherandtherebyformthenetwork.Thepurposeofthisthesisistocreateanunderstandingforhowactorsandtheirrelationshipswithinanestablishedindustrystructureareaffectedbydigitalisation.Toachievethis,semi--?structuredinterviewswereconductedwithpublishinghousesandauthors.Theboomofthee--?bookinlargepartdependsuponthetechnicaldevelopmentthathasoccurredandwhichhasintroducedsmartphones,e--?readers,surfpadsetceteraonthemarket.Moreactorswillariseinthebookindustryduetothedigitalisation,whichinturnwillaffecttheexistingrelationshipsofthepublishinghousesandtheauthors.Thepublishinghouseswillkeeptheirroleinthenetworksasakeyplayer,butcomeintocontactwithmoreactors.Theauthorsaregiventhechancetoself--?publishtheirbooksase--?books,whichmakethemcomeintocontactwithmoreactorsaswell.Asmoreactorsarise,thestructurewithintheindustrybecomesrelaxed.Hence,thepublishinghousesneedtoenrolthenewactorsinorderforthemtokeeptheirpositioninthenetwork..
Politiska nätverk och Nord Stream : En möjlighet att vara med och påverka
AbstractPaper in political science, C-level, by Lars A Roos, spring semester 2007. Tutor: Susan Marton. ?Policy networks and Nord Stream.?The purpose of this paper is to examine how the government and interest groups have been working together to commonly prevent the building of a gas pipeline in the Baltic Sea. To do this, a comprehensive question how does the government and the involved interest groups work together in policy networks? has been broken down to three more specific questions: (1) Can the cooperation between the government and the interest groups be placed within the frame of a issue network or a policy community? (2) Has the cooperation between the government and the interest groups contributed to new tools for the government to prevent the gas pipeline? (3) If the answer is yes to the second question then, which are these new tools?My examination is a case study of the policy network that exists around the Swedish actors in the case of the Baltic Sea gas pipeline.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
En för alla - Alla för en? : Krissamverkan och intern informationssamordning mellan nätverkande myndigheter
The purpose of this thesis is to study the context that affects crisis communication through an organizational perspective. It also tries to identify factors of success and difficulties when it comes to coordinating information between governmental organizations during a crisis. Carried out as a case study of the Swedish governmental network Krissamverkan Kronoberg, the method used are source analysis and qualitative interviews with members from different organizations in the network. The results have been analyzed through Organization theory, Network theory and theory in Crisis Communication. The context that effects governmental organizations ability to cooperate during a society crisis is characterized by knowledge, understanding, utility and willingness. In addition to this a successful coordination of information should be based on resources, competence and continuity. The main problems when it comes to cooperating and coordinating during a crisis situation lies in what we would like to call organizational egoism, existential uncertainty and defensive behavior. .