Sökresultat:
1934 Uppsatser om Network security - Sida 2 av 129
Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare
This bachelor thesis looks at developers knowledge about web security both
regarding their own view on their knowledge and their actual knowledge about
vulnerabilities and how you mitigate against them. Web developers knowledge
regarding web security are becoming more and more important as more
applications and services moves to the web and more and more items become
connected to the internet. We are doing this by conducting a survey among
developers that are currently studying in the field or are working in the field
to get a grip on how the knowledge is regarding the most common security
concepts. What we saw was that the result varies between the different concepts
and many lack much of the knowledge in web security that is getting
increasingly more important to have..
Vatten som säkerhetsfråga : Med FN:s konstruktion av vattenfrågan som utgångspunkt
ABSTRACTThe aim of this study is to analyse if the UN today constructs the water issue as a security issue and to argue about in which way the organization in that case does so alternatively why it can be said that the UN doesn?t construct the water issue as a security issue.In order to reach this purpose the following questions will be answered:?Does the UN construct the water issue as a security issue today?-If yes, in which way?-If no, why can it be said that the organisation doesn?t?The methods used are qualitative literature studies of policy documents on water from the UN. The focus is to analyze the ideas about water and to apply my theory on the concept of security, which is Barry Buzan?s framework on security, to these ideas.The main results showed that the UN strongly constructs the water issue as an environmental security issue for environments and species and in relatively strong terms also constructs it as an environmental security issue for civilisations. In rare cases the organisation constructs it as a societal security issue, but the UN doesn?t construct the water issue as a military, political or economic security issue..
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Nord Stream - Vägen till säkerhet?
Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security.
Vikten av säkra nätverk
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.
Vad händer i gränslandet? Människor, föremål och identitet i TV-programmet Gränsbevakarna Australien
The purpose of this paper is to study how the TV program Border Security: Australia?s FrontLine (Gränsbevakarna Australien) can be seen to reproduce networks of human and non-human actors. The aim is thus to investigate how boundaries between nations are upheld and how people, as a consequence, are discoursively categorized and what preconditions this create for people?sidentity- and meaning-making practices.The theoretical and methodical framework is built upon Bruno Latour?s work on Actor-Network-Theory, and discourse analysis inspired by Michel Foucault. The empirical material consists of two episodes of the TV program.
Urval och risk i informell finansiering av entreprenörsprojekt : En fallstudie av Firm Factory Network
This thesis discusses various approaches that venture capitalists have when evaluating investment prospects. The thesis is a case study of the business angel network Firm Factory Network. The empirical material is based on an extensive interview with Firm Factory CEO Daniel Kaplan. Our conclusion is that Firm Factory Network uses both informal and formal methods when they evaluate interesting prospects..
"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten
This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.
Synen på Säkerhet och Immigration : Finns det ett samband?
The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..
Internationell fred och säkerhet ur ett genusperspektiv: En diskursiv studie av Säkerhetsrådets resolutioner för kvinnor, fred och säkerhet
The Security Council?s resolution 1325 addressed the major negative impact that armed conflict has on women and children. This in turn complicates the Council?s work on maintaining international peace and security. The resolution therefore highlights women?s rights as participants in peace- and conflict processes.
Cloud Computing - A Study of Performance and Security
Cloud Computing är det stora modeordet i IT-världen just nu. Det har blivit mer och mer populärt på senare år men frågor har uppstått om dess prestanda och säkerhet. Hur säkert är det egentligen och är det någon större skillnad i prestanda mellan en lokal server och en molnbaserad server? Detta examensarbete tar upp dessa frågor. En serie prestandatester kombinerat med en litteraturstudie genomfördes för att få fram ett resultatet för detta examensarbete.
Denna rapport kan komma att vara till nytta för de som har ett intresse av Cloud Computing men som saknar någon större kunskap om ämnet.
Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.
Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.
När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen
This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.
Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt
In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.
Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker
For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance ? which is a fusion of information security and IT governance.This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was done through interviews and surveys that were triangulated to get a gathered picture of the quality of the security governance activities.