Sök:

Sökresultat:

1941 Uppsatser om Network security and countermeasures - Sida 7 av 130

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet

The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper  is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.

Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter

In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.

Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter

Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..

Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation

Offentliga trådlösa nätverk finns idag mer tillgängliga än någonsin. Samtidigt haralla dessa nätverk något gemensamt ? de går alla att avlyssna och risken finns attanvändarens information kan komma i fel händer. Uppsatsen behandlarallmänhetens säkerhetsmedvetenhet med avseende på denna typ av nätverk genomtvå undersökningar. Den första undersökningen sker via ett tekniskt experiment därdet på flera geografiska platser har erbjudits ett trådlöst nätverk till allmänheten.

Minivindkraftverks inverkan på lågspänningsnät

Micro-power wind energy convertors have recently increased in popularity. The reasons for this are among other things the increasing cost of electric energy and enviromental concern.In this thesis the connection of these micro-power wind energy convertors to the utility network is discussed. Electric standards for the connection of small production units is presented. Finally some calculations and measurements of electric quality are also presented. The utility network used in the calculations is part of Halmstad Energi och Miljö network..

Riskhanteringens utmaning : En studie som identifierar svenska organisationers riskhantering avseende informationssäkerhet samt dess prioritering.

Background: Risk Management plays an important part of the enterprises strategic business activity. Efficient Risk Management will secure the businesses survival, assets and creates market advantages. The interest of information security has consequently gained in Swedish corporations. Corporations have realized the importance of the information which is stored in the IT systems. IT is the tool for businesses future progress and growth and therefore a source of risks.

Quality of Service i IP-nätverk

The original promise behind the Internet Protocol was to deliver data from a sender to the receiver using a best-effort approach. This means that the protocol makes no guarantees except that it will try to deliver the data to the destination. If some problem occurs the packet may be discarded by the network without any notice. No guarantees are made regarding the time it takes to deliver the data, the rate at which data will be delivered or if data is delivered in the same order it was sent. The best-effort approach is arguably the reason behind the success of the Internet Protocol and is what makes IP scalable to networks the size of the Internet.

Säkerhetspolitik, Medborgare & Frihet

The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.

Informationssäkerhet i arkitekturbeskrivningar : En studie i hur säkerhetsfunktioner kan beskrivas med hjälp av vyer

Information security is an essential part of all information systems; especially in large organizations and companies dealing with classified material. Every large information system has an architecture that includes many parts that together form an Enterprise Architecture. The aim of this thesis is to study how to describe several security functions in an Enterprise Architecture and also how to ensure accountability between requirements and the implementation of the security functions. The description is for stakeholders on a conceptual level rather than a technical level. The study has been carried out by comparing the theoretical framework that has been formed by a study of the literature, and the empirical framework that has been formed by a group discussion and interviews with Information Security Consultants from Combitech AB.

Software keystroke logging : Automatisering av skydd mot software keystroke logging

This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter.

STUDENTERS INFORMATIONSHORISONTER: Användning av Google och sociala nätverk i informationsökningsprocessen

The theses discuss information seeking with a focus on Google and social networks. Students attending the librarian program in Lund have been examined by means of two methods; diaries and information horizons, where they had to solve a specific assignment. The information horizon as a method contributes to getting a structural perspective on the information search process instead of viewing information search as a procedure. Information horizons use social network analysis.The aim of the theses is to investigate the importance of the social network in information search, with a particular focus on Google as a search tool. Our hypothesis is that Google acts as a compensator to the social network when the students search for information and in the educational program.The research indicates that there is no direct correlation between usage of the social network and usage of Google.

Riktlinjer för implementering av ISO 17799

An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.

Vapenhandel : En kontradiktion till EU:s utvecklingspolitik?

Arms trade is a multi-faced issue, it can increase the state's economic revenue; however also endanger the human security. The European Union's member state United Kingdom is one of the five largest arms traders in the world. The EU promotes human security in its work, especially in the union's development policies. These circumstances address the main question of the study: is there a contradiction between the UK's arms trade and the EU development policies. The objective of this study is to research the stately weapon use in three of the UK's trading partners, and how it could affect the EU development policies.

Flygvapnets Transformation : Fallstudie i flygutbildningens omtvistade placering

The transformation among armed forces in Europe is a consequence due to shifted security perspective and the growth of international security actors, such as NATO and the EU. Sweden has played an active role in EU to ensure its influence in forming the security policy for the organisation. Some studies mean it´s because of Sweden?s interest in strengthen EUs roll as a security actor they transformed their own armed forces to be able to take part in international operations. This transformation led to what can be called ?the Swedish defence dismantle? and some studies mean that it has led to the point where Sweden completely lacks the ability to defence themselves.The question is if the ambition to become an active member in these security organisations can explain all the decisions made throughout the Swedish defence-transformation, or if some decisions were made due to other factors?By studying the decision process leading up to the decision to locate the flight education to Malmen in Linköping this study seeks to answer why the decision was made.

<- Föregående sida 7 Nästa sida ->