
Sökresultat:
1941 Uppsatser om Network security and countermeasures - Sida 16 av 130
Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd
How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.
Ip-telefoni med Skype som ett alternativ till PSTN för privatanvändare
The project is a practical and theoretical test of IP telephony with Skype in order to form a base for a comparison between IP-Telephony with Skype and the Public Switched Telephony Network (PSTN). PSTN is the common standard that most of us use for telephony today. The objective for the study is to simplify the choice between PSTN and IP-Telephony for the Swedish private customer user group. The project is supposed to answer the following questions. - How easy is it to start using IP-telephony with Skype? - How is the quality of IP-telephony compared to PSTN? - Are all services provided by PSTN available and accessible using the IP-solution? - How are the usability and the availability of support with IP telephony? - Is IP-telephony a cheaper solution and in that case under which circumstances? Within the project a collection of practical and theoretical tests have been performed to be able to form an opinion on the IP-solution in the following areas, installation, function, quality, usability, costs, accessibility and security.
Implementation av fältbuss ASIC i FPGA
HMS Industrial Networks AB is in need of changing a communications solution that iscurrently based on an ASIC. This will be achieved by moving the communications solution toa FPGA with the help of the programming language VHDL. By doing this, it is possible toreduce the need for specific circuits, get a more flexible platform and thus get a cheapersolution.This report describes a solution for how to move a network protocol from an ASIC to anFPGA. The report shows that the network slave device is working under the guidelines forthis project. This means that it is quite realistic to implement a fieldbus protocol on an FPGA,using VHDL and to maintain the same functionality as the earlier communications solution..
Al-Qaida - mellan tankeprodukt och reell fiende
The present thesis closer examines what has come to be known as al-Qaida, partly from what al-Qaida is considered to be, partly from the consequences a certain picture of al-Qaida might give rise to. Between 1988-2001 most of this thesis sources refers to al-Qaida as a small, organized core group with some degree of cell structure. From 1991 to present days, many of the sources enlarge the picture of al-Qaida. From now on they start to view al-Qaida as either a network in itself or al-Qaida as a part of a larger islamistic network, not only as an organized core group with presumptive bases in Afghanistan. The most recent of theories regarding al-Qaida looks at al-Qaida as an ideology in itself (al-Qaedaism) or al-Qaida as a part of previously existing ideologies (Islamism, Neofundamentalism and Jihadism-Salafism).Al-Qaida is being seen - by scholars, journalists and terrorism experts - as an organization with a core group, a network in itself, part of a larger islamistic network and an ideology of its own or as a part of already existing ideologies.
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.
Tidssynkroniserade mätningar i vattenkraftstationer
Vattenfall and Svenska Kraftnät perform start-up tests, where hydropower generators are used to power up the electrical grid in case of a blackout. To monitor the electrical grid, Phasor Measurement Units (PMU) are used. Each PMU is individually equipped with a GPS-receiver to precisely timestamp the data relative to the official time UTC. During the test, it is also of interest to timestamp the measurement signals from individual hydropower generators to later compare with PMU-data, and thus study the power grids impact on the generator. The aim is to work out an appropriate method to make these measurements and to build a data acquisition system, capable of timestamp data relative to UTC, from a generator in one of Vattenfalls hydroelectric power stations. The problem is that the generator is located in an underground station which hampers the reception of GPS-signals and wiring should be avoided if possible. Time synchronization has been solved by using Vattenfalls network, which is synchronized by the network protocol NTP.
Ip-telefoni med Skype som ett alternativ till PSTN för privatanvändare
The project is a practical and theoretical test of IP telephony with Skype in
order to form a base for a comparison between IP-Telephony with Skype and the
Public Switched Telephony Network (PSTN). PSTN is the common standard that most
of us use for telephony today. The objective for the study is to simplify the
choice between PSTN and IP-Telephony for the Swedish private customer user
group.
The project is supposed to answer the following questions.
- How easy is it to start using IP-telephony with Skype?
- How is the quality of IP-telephony compared to PSTN?
- Are all services provided by PSTN available and accessible using the
IP-solution?
- How are the usability and the availability of support with IP telephony?
- Is IP-telephony a cheaper solution and in that case under which circumstances?
Within the project a collection of practical and theoretical tests have been
performed to be able to form an opinion on the IP-solution in the following
areas, installation, function, quality, usability, costs, accessibility and
security.
In order to study usability, a test group of ten persons have been used to
evaluate the usability of the system.
Small-worlds och rich-clubs bland bloggar : En nätverksanalys av den svenska bloggosfären under FRA-debatten 2008
Purpose/Aim: To find power structures within the blog network.Material/Method: Using keywords to find all available blog posts about the National Defence Radio Establishment from the blog search engine Twingly, and thereafter using the same blog search engine to find inlinks from other blogs, to those posts. The data is set into the context of the small-world networks models of Duncan J. Watts and rich-club models of Sergi Valverde och Ricard V. Sole.Main results: 5183 unique blogs have written about the subject in 22779 blog posts to which 28128 inlinks from other blogposts are made. Just over one fifth of the blogs are linkted to each other in one big network, where the remaining blogs stand without any ingoing or outgoing links.
Förstudie till införandet av centralt loggsystem hos Försvarsmakten
Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.
Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?
This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.
Det står ?jävlig mamma? skrivet i pannan på mig" : En kvalitativ studie om föräldrar till barn med diagnos inom autismspektrumet och deras vardag
The purpose of the study isto,based on network theory, systems theory and development ecological systems theory,understand parent?sexperiences of having children with autismspectrum, as well as understand the importance of social networksfor the parents. All of the intervieweeswere mothers. The results showed that it is important to parentsto have contact with other parents who are in the same situation as them. Many of the interviewees had a small social network.
Personarkiv på Kungliga biblioteket -ordningar, kopplingar och krockar på ett nationalbibliotek
The departure point of this thesis is the context of the institution and the processes surrounding the handling of personal archives at the National Library of Sweden. These processes are examined using Actor Network Theory. Around the personal archive a network is constructed and contained by actors ? the archive itself, the librarian, the conservator, the researcher, organizational structures and others. Within this network choices are made of what is significant.
Identitetspresentation på Instagram : En studie i användares upplevelser och attityder till sin identitetspresentation på Instagram
In recent years, the internet has exploded of images. Not at least in the popular photo-sharing network Instagram as one of the fastest growing social network for the moment. Millions of people around the world share pictures and expose themself for friends and family. We were therefore interested in which experiences and attitudes users have towards their identities in relation to their self-image and self-presentation on Instagram. Furthermore, whether they in general have a primary interest in using Instagram as a tool to experiment with images to present their identity on Instagram, in which way they approach their Instagram follower?s expectations on how they present themselves on Instagram and if they are aware of any strategies in their self-presentation on Instagram.The result of this study is the fact that our respondents thinks that they do not intend to have a primary interest in experimenting with images on Instagram to present their identitiy, it is rather something that comes naturally in how they present themselves on Instagram.
Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet
The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.
Den svenska äldrevården : Behov, konkurrens, kvalitet och valfrihet ur ett fastighetsperspektiv
In this thesis an explorative study was undertaken with the aim to study how a number of private care providers, as well as politicians and officials from councils in and around the Stockholm and Uppsala counties, think about the future of the Swedish elderly care from a property perspective, i.e. homes for the elderly. The analysis shows that there is a demand for capacity in 6 out of 16 municipalities, and that the property is an important part of this capacity, and the fulfillment of it. This was mainly due to the cost of capital, but also because of several other factors such as lack of land, a wish to guide the design, ideology, and in many cases a wish to use the property as an instrument of domination to control private health care providers.Also, the property was show to be connected to economic competition, to freedom of choice, and to quality. The problems related to the property in the market for elderly care still remains to be solved.