
Sökresultat:
1941 Uppsatser om Network security and countermeasures - Sida 6 av 130
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
Utvärdering av Artificiella Neurala Arkitekturer För Navigering
Den klassiska approachen till navigering innefattar att agenten håller en intern representativ modell av omgivningen. Denna approach har emellertid många nackdelar, speciellt för dynamiska miljöer. En modernare approach är att förlita sig på den faktiska omgivningen istället för en modell av denna. Detta arbete presenterar en undersökning av navigeringsproblemet och hur väl det löses av agenter vars kontrollmekanismer utgörs artificiella neurala nätverk. Tillförlitligheten hos de två neurala arkitekturerna Extended sequential cascaded network och Self-organized recurrent network bestäms genom experiment.
GPS-baserad virtuell geografisk inhägnad för mobil enhet
The aim of this paper is to find an algorithm to establish and maintain a virtual enclosure around a mobile unit. The area may take any form and should be scalable up to and including national borders. The enclosure is managed on the mobile unit. The target system is Android. Smartphones, tablets and more recently, cameras is examples of mobile units.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Samarbete och nätverksbyggande över kommunens gränser : En studie om Norrköpings kommuns medlemskap i Sweden Emilia Romagna Network utifrån ett aktör-nätverksperspektiv
Social networks have increased significantly during the latest decades, but what does the cooperation include and how does the network processes look like? Networks are not specific for communities in the 2000?s or for that matter human organisations, but the ability to build networks and introduce more actors to the organisation have become easier with today?s communication technology. The study is about the Norrköping Municipality membership in the transnational network Sweden Emilia Romagna Network (SERN). It gives an insight into how networking and cooperation can be seen by politicians and officials, based on mission statements and the reason why a municipality choose to participate in transnational networks. The study aims to examine how Norrköping Municipality uses the SERN network and what the network have resulted in since the beginning of the municipality membership in 2005. It is a qualitative study which involves interviews with officials and politicians from the Municipality of Norrköping and textual material from SERN?s strategy documents and policies.
Clemens en August - A Network Perspective
The purpose of the paper is to explore of what importance network relations are to the small fashion company Clemens en August. Clemens en August is a new German fashion label, which has the goal to become established in the high-end segment. The company uses an innovative sales strategy, directly distributing its products to the end costumer. The theories used will serve as a tool to analyze Clemens en August 's strategy from a network perspective. As the Bachelors thesis nr: 12464 ?Clemens en August ? A Network Perspective?, authors; Malin Elmlid, Biancastella De Angelis and Carsten Juldorf, date of approval 2006-01-11, contains delicate data about the studied company we have decided to classify it as secret.
Nätverk i landsbygdsföretag : fallet Mälarlandet
The interest in companies that are based outside the cities has grown, and many of these companies have focused their activities around service. The countryside companies meet some difficulties in marketing and communication with other entrepreneurs. A network with service based companies in the countryside could help the individual companies to promote themselves and also give inspiration and new ideas to develop their business. The aim of this study is to investigate how a countryside network can be organized but also what conditions is needed to make the network function. The theory is based on a literature study of the three major topics "countryside", "networking" and "marketing".
Från soptipp till naturreservat : En studie av makt i Lövsta-Kyrkhamn-Riddersvik genom actor-network theory
This paper investigates, through an actor-network theory perspective, how the recreation area Lo?vsta-Kyrkhamn-Riddersvik northwest of Stockholm has developed from being a dumping site into becoming a nature reserve. This investigation also tries to describe and explain which values that have been promoted in the area by the local voluntary associations and companies. Lo?vsta-Kyrkhamn-Riddersvik has been inhabited for more than 3000 years, originally with farming as the most important business.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
GPS-baserad virtuell geografisk inhägnad för mobil enhet
The aim of this paper is to find an algorithm to establish and maintain a
virtual
enclosure around a mobile unit. The area may take any form and should be
scalable
up to and including national borders. The enclosure is managed on the mobile
unit.
The target system is Android.
Smartphones, tablets and more recently, cameras is examples of mobile units. A
modern mobile unit is part of a computer network.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Konsten att styra konst: - styrning av kreativa projekt inom en nätverksorganisation
This paper describes a case study of the largest film production ever conducted in Scandinavia. The study aims at explaining the complex relationships in the network structure in which the project took place. Coordination of creative projects carried out in a network context, includes handling conflicting interest and contradictions. Creativity needs space and freedom while projects need structure and coordination, whereby controlling these projects becomes complex. Adding to the complexity, does the loose form of organization that the network structure represents, without any long term structure.
Att göra nya val - om nätverkets delaktighet i ungdomars väg ut ur ett missbruk
The aim of this study was to examine how young people, who have been treated for their misuse and/or to learn to handle a parent's misuse, portrayed the network's implication in their wishes about improving their lives, to make new choices. The network included members of nuclear family, relatives, important persons at school/work and friends. The ?professional network? (therapists and social workers) also became a part in the young people's life during a period. The main issues of this study concerned differences in their experiences of the young persons´ network relationships in before, during and after completed treatment.