Sökresultat:
1934 Uppsatser om Network security - Sida 21 av 129
Bästa molntjänstföretag för Nexus Consulting
This report deals with an IT solution for the fictive company, Nexus Consulting. It is a small company with four employees, dealing with economic policy. The company wishes to set up a complete network environment with antivirus, firewall, computers and servers. They want us to analyze and compare different outsourcing companies offering cloud services and then recommend which company would suit them best.In addition, the company wants to have a webpage containing essential information about them and the services that they offer their customers.The report describes, analyzes and compares three outsourcing companies offering complete cloud services where a practical solution proposal has been developed by the group.The network component is based on the Windows platform and the web part is coded in HTML and PHP.The report also discusses what cloud computing is and why so many companies choose to move to it..
Delaktighet En kritisk analys av kunskapsinsamling för kulturmiljöunderlag
Language of text: SwedishNumber of pages: 90.
Irans anrikning av uran - Analys av aktörer och säkerhetiseringsprocesser
This theory consuming thesis is concerned with why Iran's uranium enrichment has become a security issue, and will focus on the five most important and involved actors: China, Russia, Iran, the US and the UN. I will do this by using instruments of analysis such as securitization and strategic analysis. With these instruments I will examine different factors, such as deterrence, the action-reaction model and armament. Since, according to my opinion, security matters include more sectors than military I will also examine the political, societal and economic sectors. China and Russia have acted differently compared to the US in this matter and this thesis will highlight the factors that can explain the different actions made by these countries.
INTERAKTION I EN VIRTUELL GRUPP : gapet i det normbildande ramverket
The existence of social networks on the Internet is today seen as broad, and the number of users of the network is increasing. There seems to be many reasons to which people are using the social networks. Within the network, users can for various reasons create groups with different objectives. One of the reasons is that groups are created in order to influence a company. With a perceived feeling that companies handle the problem differently, we assume the source is the uncertainty about what the groups really are.
Klient-server och Peer-to-Peer applikationer : En prestandajämförelse
An increasing number of applications are becoming more or less network based today.The traditional architecture for network based applications is client-server, but as usageof download services are going up, so is the Peer-to-Peer architecture. This report is acomparison between the Peer-to-Peer and client-server model, and can serve as a basiswhen a decision between them needs to be taken. In the report, the performancebetween the different architectures is compared in different contexts. Our basis is ageneral implementation of both architectures in a test that is derived from a previousreport. On top of this, the performance of the different architectures are measured,implemented in a gaming-context.
Analys av fingeravtryck
This report describes a system for verification of fingerprints against a previous created template. It describes how and why a fingerprint image must be processed before it can be used to either identify or verify a person. The method is based on special features of a fingerprint, called minutiae points. The whole process from image to matching is described, every step in the process with image enhancement, binarization, thinning and how to find the minutiae points. Also what false minutiae points are, how they arise, why they deteriorate the result, and how to handle them, is discussed.
SJUKSKÖTERSKORS ERFARENHETER AV STÖD TILL MÖDRAR SOM AMMAR : inom barnavårdscentral
Abstract:Background: Socialstyrelsen statistics show that breastfeeding continues to decline. Previous research some mother experiencing breastfeeding difficulties and their lack of knowledge and understanding of breastfeeding. Support to mothers varies depending on their individual needs. Factors affecting the choice are the support of health care nurses and the social network. Aim: The aim of this study was to describe health care nurse experiences of giving support to mother who are breastfeeding.
?Vi försvinner som en droppe i havet?: En uppsats om svenska civilsamhällesorganisationers upplevelser av sina påverkansmöjligheter i EU
This Bachelor Thesis looks at the cooperation between the Swedish civil society and theEuropean Union (EU), and it aims at evaluating Swedish civil society organizations' influencewithin the EU's development work on policy level. It focuses primarily on eight civil societyorganizations, and it is based on empirical material collected in Stockholm and Gothenburg,Sweden. The material has been analyzed using three theoretical frameworks. The firstdetermines whether the structure of the EU allows bottom-up influence, the second looks atthe communication between the EU and civil society organizations, and the third assesseswhether the civil society has the ability to influence the political agenda within the EU?sdevelopment work.Conclusions of the thesis include determining the complex structure of the EU as a mainobstacle to influencing the EU's development work.
Jag ser att du har ont : Validering från partner till patienter med kronisk smärtproblematik; Effekt på emotioner
The purpose of this essay is to investigate what kind of motives where behind the long term decisions for the Swedish military defense in 2000 and 2004. This leads to the questions that the essay is meant to answer; 1. Were the motives behind the two decisions for the Swedish military defense of economic character or an adjustment of security and defense policy? 2. Was the parliament united in the two decisions and if they were not, why? 3.
Datalagring : nätverkslösning
I dagens samhälle har många kundföretag problem med datalagringen vilket beror på att behovet av att lagra data började öka kraftigt under 2000-talet och har fortsatt öka sedan dess. När kundföretagen började använda sig av virtualisering så expanderade även datastorleken. I samband med att datastorleken växte ville företagen att data inte skulle lagras lokalt utan att den skulle vara lagrad på en central plats som en serverhall och vara överskådlig.Studien utfördes på tre sätt, först undersöktes vilka datalagringslösningar som fanns och det skedde genom litteraturstudier. Därefter kontaktades företag som använde olika lösningar för datalagring. Nästa steg var att kontakta de leverantörer som kundföretag använde sig av och som levererade lösningarna.Under arbetets gång upptäcktes olika lösningar på problematiken med ett ökat datalagringsbehov.
Framtagning av en förebyggande åtgärd mot kriminalitet vid lastbilstransporter
Boberg at Scania CV AB. The purpose was to investigate the technical and customer oriented possibilities for the development of a transport security measure against cargo crime, which is a growing problem in Europe. The main goal was to develop a concept that is possible to implement in the Scania CV AB Fleet Management System. Another goal was to develop a security model that will be used as a tool during Scania CV AB?s future development projects of transport security concepts.The work was divided into three main parts: a background study, handling cargo crime, transport security Scania CV AB trucks and market analysis, a stakeholder investigation including a questionnaire and interviews, and a concept development session.
Vilken inverkan har socialt nätverk på äldres hälsa? En litteraturöversikt om socialt nätverk och äldres hälsa
An individual's social capital consists largely of the social networks that may consist offamily, friends and acquaintances. The social network is of great significance on olderpeople's physical and mental health. Aim: The overall purpose is to examine the knowledgeof social network and the health of the elderly. Method: Litterature review, using threedifferent databases, CINAHL, PubMed and Scoupus for searching of articles, with differentcombinations of keywords. Results: Different types of social networks have both positive andnegative effects on health.
Försäkringsbedrägerier : En studie av sambandet mellan självrisk och oberättigade ersättningskrav
The purpose of this essay is to investigate what kind of motives where behind the long term decisions for the Swedish military defense in 2000 and 2004. This leads to the questions that the essay is meant to answer; 1. Were the motives behind the two decisions for the Swedish military defense of economic character or an adjustment of security and defense policy? 2. Was the parliament united in the two decisions and if they were not, why? 3.
MSBs respons p? cyberhot: En empirisk underso?kning av MSB:s framst?llning av ?kad cyberhotniv? efter invasionen i Ukraina.
This thesis aims to study how cybersecurity is managed and framed in the context of the
growing threat landscape as a result of the Ukraine Invasion. The war in Ukraine is one of the
first conflicts involving extensive cyber operations, furthermore this study is interested in
how Sweden, more specifically MSB, considers global security challenges and if they can
learn from the conflict in Ukraine. Through a qualitative text analysis, focusing on two
reports published by MSB, the study, using securitization and framing as theoretical
frameworks, seeks to answer the research question ?How has MSB changed its representation
of the threat and adapted its security strategy to address the increasing threat to cybersecurity
following the invasion of Ukraine??. The analysis is based on five operationalization
questions to clarify whether there are indications of securitization and framing in the reports.
The study also aims to identify if there is a more clear threat formulated to cybersecurity.
Säkerhetsstandard för ett mjukvarubaserat säkerhetselement
Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.