Sök:

Sökresultat:

1926 Uppsatser om Network security and countermeasures - Sida 2 av 129

Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.

In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..

Funktionsanalys och åtgärdsförslag avkommunikationslösning hos driftleverantör

No infrastructures today are growing faster then communication network. The requirement of being able to communicate in a fast and qualified environment to a low cost increases in line with the development and competition. Itera Networks is no exception when it comes to rapidly developing new and better network solutions for themselves and for their customers. With these requirements in mind their needs for an analysis of the existing communication solution becomes very obvious. This project contains such an analysis in which various studies of the existing network environment have been made.

Webbsäkerhet och vanliga brister : kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

Vatten som säkerhetsfråga : Med FN:s konstruktion av vattenfrågan som utgångspunkt

ABSTRACTThe aim of this study is to analyse if the UN today constructs the water issue as a security issue and to argue about in which way the organization in that case does so alternatively why it can be said that the UN doesn?t construct the water issue as a security issue.In order to reach this purpose the following questions will be answered:?Does the UN construct the water issue as a security issue today?-If yes, in which way?-If no, why can it be said that the organisation doesn?t?The methods used are qualitative literature studies of policy documents on water from the UN. The focus is to analyze the ideas about water and to apply my theory on the concept of security, which is Barry Buzan?s framework on security, to these ideas.The main results showed that the UN strongly constructs the water issue as an environmental security issue for environments and species and in relatively strong terms also constructs it as an environmental security issue for civilisations. In rare cases the organisation constructs it as a societal security issue, but the UN doesn?t construct the water issue as a military, political or economic security issue..

WLAN : Oskyddad och okontrollerad datakommunikation

This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.

Nord Stream - Vägen till säkerhet?

Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security.

Vikten av säkra nätverk

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.

Vad händer i gränslandet? Människor, föremål och identitet i TV-programmet Gränsbevakarna Australien

The purpose of this paper is to study how the TV program Border Security: Australia?s FrontLine (Gränsbevakarna Australien) can be seen to reproduce networks of human and non-human actors. The aim is thus to investigate how boundaries between nations are upheld and how people, as a consequence, are discoursively categorized and what preconditions this create for people?sidentity- and meaning-making practices.The theoretical and methodical framework is built upon Bruno Latour?s work on Actor-Network-Theory, and discourse analysis inspired by Michel Foucault. The empirical material consists of two episodes of the TV program.

Urval och risk i informell finansiering av entreprenörsprojekt : En fallstudie av Firm Factory Network

This thesis discusses various approaches that venture capitalists have when evaluating investment prospects. The thesis is a case study of the business angel network Firm Factory Network. The empirical material is based on an extensive interview with Firm Factory CEO Daniel Kaplan. Our conclusion is that Firm Factory Network uses both informal and formal methods when they evaluate interesting prospects..

"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten

This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.

Synen på Säkerhet och Immigration : Finns det ett samband?

The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..

Internationell fred och säkerhet ur ett genusperspektiv: En diskursiv studie av Säkerhetsrådets resolutioner för kvinnor, fred och säkerhet

The Security Council?s resolution 1325 addressed the major negative impact that armed conflict has on women and children. This in turn complicates the Council?s work on maintaining international peace and security. The resolution therefore highlights women?s rights as participants in peace- and conflict processes.

Cloud Computing - A Study of Performance and Security

Cloud Computing är det stora modeordet i IT-världen just nu. Det har blivit mer och mer populärt på senare år men frågor har uppstått om dess prestanda och säkerhet. Hur säkert är det egentligen och är det någon större skillnad i prestanda mellan en lokal server och en molnbaserad server? Detta examensarbete tar upp dessa frågor. En serie prestandatester kombinerat med en litteraturstudie genomfördes för att få fram ett resultatet för detta examensarbete. Denna rapport kan komma att vara till nytta för de som har ett intresse av Cloud Computing men som saknar någon större kunskap om ämnet.

Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.

Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

<- Föregående sida 2 Nästa sida ->