Sökresultat:
1934 Uppsatser om Network security - Sida 15 av 129
Folkpartiets syn på svensk säkerhets- och utrikespolitik 1956-1974 : En jämförande analys av Folkpartiets syn på svensk säkerhets- och utrikespolitiska frågor i förhållande till regeringen
The socialdemokrats? long possession of government power from the 1930?s to 1976 gave them the opportunity to put their stamp on Swedish domestic and foreign affairs in the shadow of the cold war. The government policy in security and foreign affairs, therefore, was that of the socialdemokratic party. The stance of the government has been researched, but it lacks focus on the opposition. The purpose of this paper is to analyse Folkpartiet´s view of security and foreign affairs in comparison with government policy.
Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen
Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.
Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov
The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Säkerhet och integritet i närfältskommunikation
Context. In today?s society we use smart cards in many areas, NFC is a smart
card technology that allows contactless interaction between a reader and the
tag, the tag is often in the form of a card. NFC can be used for various
payment methods or as access card to a building which makes life easier. In
previous studies, the technique has proven to be weak to attacks using an NFC
reader connected to a computer.
Kommunikation inom e-handel : En undersökning ur konsumentperspektiv
AbstractDespite that e-business nowadays is established scepsis against it amongst consumers exists. We, as consumers, suppose that this skepticism is caused by bad communication from the e-business companies. This has lead to our suggestion that some con-sumers refrain from e-business because of bad communication or deficient trust.Our purpose with this paper was to investigate factors of communication between companies and consumers within e-business (B2C) from the consumers? point of view. We thereby have drawn conclusions regarding consumers? choice of e-business company.
Att arbeta med ensamkommande flyktingbarn : En kvalitativ studie ur ett personalperspektiv på HVB-hem
The aim of this study is to investigate what kind of support unaccompanied children needs when arriving in Sweden, according to the staff that is receiving unaccompanied asylum seeking children in Sweden. The method is qualitative and is based on interviews and previous research. The result shows that the main subjects who were of interest from the interviews are elementary need, the support offered, security, ?parental gestalt?, education, leisure, obstacles in the work.All the interviewees describe young people's needs very different when it differs from person to person. The support children receive is the most important factor that unaccompanied children need to be developed and get a better and safer life.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik
The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.
Lärande i molnet : EduSync belyst ur ett connectivistiskt synsätt
This essay has discussed and analyzed a draft for an idea about a network called EduSync. This idea is based on that teachers and students, attending and holding courses, all over the world should be able to find and interact with each other. EduSync is founded from a new learning theory, connectivism. Interviews, participation in a conference and two workshops have been used to gather information and different points of view concerning e-learning, for example possibilities and problems with this idea of a network. A comparison of web communities and e-learning environments that exists today was also done. The gathered information from persons as well as literature resulted in a discussion concerning learning and what would or would not be possible with the creation of EduSync.
Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd
How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.
Ip-telefoni med Skype som ett alternativ till PSTN för privatanvändare
The project is a practical and theoretical test of IP telephony with Skype in order to form a base for a comparison between IP-Telephony with Skype and the Public Switched Telephony Network (PSTN). PSTN is the common standard that most of us use for telephony today. The objective for the study is to simplify the choice between PSTN and IP-Telephony for the Swedish private customer user group. The project is supposed to answer the following questions. - How easy is it to start using IP-telephony with Skype? - How is the quality of IP-telephony compared to PSTN? - Are all services provided by PSTN available and accessible using the IP-solution? - How are the usability and the availability of support with IP telephony? - Is IP-telephony a cheaper solution and in that case under which circumstances? Within the project a collection of practical and theoretical tests have been performed to be able to form an opinion on the IP-solution in the following areas, installation, function, quality, usability, costs, accessibility and security.
Implementation av fältbuss ASIC i FPGA
HMS Industrial Networks AB is in need of changing a communications solution that iscurrently based on an ASIC. This will be achieved by moving the communications solution toa FPGA with the help of the programming language VHDL. By doing this, it is possible toreduce the need for specific circuits, get a more flexible platform and thus get a cheapersolution.This report describes a solution for how to move a network protocol from an ASIC to anFPGA. The report shows that the network slave device is working under the guidelines forthis project. This means that it is quite realistic to implement a fieldbus protocol on an FPGA,using VHDL and to maintain the same functionality as the earlier communications solution..
Al-Qaida - mellan tankeprodukt och reell fiende
The present thesis closer examines what has come to be known as al-Qaida, partly from what al-Qaida is considered to be, partly from the consequences a certain picture of al-Qaida might give rise to. Between 1988-2001 most of this thesis sources refers to al-Qaida as a small, organized core group with some degree of cell structure. From 1991 to present days, many of the sources enlarge the picture of al-Qaida. From now on they start to view al-Qaida as either a network in itself or al-Qaida as a part of a larger islamistic network, not only as an organized core group with presumptive bases in Afghanistan. The most recent of theories regarding al-Qaida looks at al-Qaida as an ideology in itself (al-Qaedaism) or al-Qaida as a part of previously existing ideologies (Islamism, Neofundamentalism and Jihadism-Salafism).Al-Qaida is being seen - by scholars, journalists and terrorism experts - as an organization with a core group, a network in itself, part of a larger islamistic network and an ideology of its own or as a part of already existing ideologies.
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.