Sök:

Sökresultat:

1934 Uppsatser om Network security - Sida 1 av 129

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna

The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..

Granskning och optimering av data- och IP-telefoninätverk

The company Västra Mälardalens Kommunalförbund, VMKF, wishes to revise and optimize their present data and IP-telephony network as of today consists of the three municipalities Köping, Arboga and Kungsör. As a municipal corporation, they seek consultation regarding internal as well as external review and investigation of the main structure of the network, its functionality and safety. By today?s increasing demands of Internet accessibility, availability of services and security far more extends the requirement of a complete network design. The foundation of networking rests on the balance between each of these necessities.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Trygghet och trygghetsskapande i arbetslivet

In this paper we examine what security is to the individual and how the individual creates and maintains security in their work. The purpose of this paper is to study how the creating of security in working life is performed. We conduct six semi-structured qualitative interviews with permanent employees in the private sector and we encode our material using thematic analysis. We analyze our material and illustrate our problem area on the basis of Anthony Giddens's theory of ontological security and give examples of how security and creating of security is performed at the empirical field with previous studies in the research area. Our survey shows that security for the individual at work seems to be about having continuity in everyday life, financial stability, a permanent employment, a challenging and fun job and a family in good health and good living.

Implementation av Network Admission Control

This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don?t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers.

Säkerheten i trådlösa nätverk

The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.

HAVECA-modellen : En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Brandväggar för hemmakontor

Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable.

Värdeskapande i nätverk

The purpose of this thesis is to examine value creation in networks. Based on a case study of Livebookings Network, an online booking service. This thesis has an explorative nature. As a theoretical framework we use theories on value and network dynamics. By combining these theories we develop an operationalized framework that we use to analyze our empirical findings.

Analys och omarbetning av ett företagsnätverk

In this paper, a small business network with around 30 users is analyzed with respect to security, performance and usability. Based on this analysis, two suggestions on how to solve the problems listed are given. The first suggestion focus on keeping a low budget, while the other tries to deal with the problems more thoroughly. One advantage of the first suggestion is, in addition to not straining the company's budget more than nessecary, it does not involve too great changes in the way the network is used and administered. On the other hand, the smaller budget leads to certain compromises, and there is a risk that similar problems occur again if, for example, the company would grow.

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.

In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..

Funktionsanalys och åtgärdsförslag avkommunikationslösning hos driftleverantör

No infrastructures today are growing faster then communication network. The requirement of being able to communicate in a fast and qualified environment to a low cost increases in line with the development and competition. Itera Networks is no exception when it comes to rapidly developing new and better network solutions for themselves and for their customers. With these requirements in mind their needs for an analysis of the existing communication solution becomes very obvious. This project contains such an analysis in which various studies of the existing network environment have been made.

Webbsäkerhet och vanliga brister : kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

1 Nästa sida ->