Sök:

Sökresultat:

1934 Uppsatser om Network security - Sida 4 av 129

Nulägesanalys och verifiering av autentiseringsmetoder : En studie på ett konsultbolag i nätverksbranschen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Beredning av lokalnät i landsbygd

In this thesis a rural network in Norrbotten, Sweden, has been to designed and planned with the purpose of improving distribution reliability by exchanging existing overhead lines with underground cables. General network design considerations are discussed as well as the ones for the specific low voltage grid. During the design phase the maximum power of domestic consumers has been estimated using Velander?s method. Currents, voltage drop and impedance of the network have been calculated and fuse operation and selectivity has been considered.

Säkerhetstänkande integrerat i systemdesign via formaliserade metoder

Systems development methods mirror different organizational perspectives, and not all methods are formalised, but what they have in common is the purpose of structuring and supporting systems development processes. Which method would be the most suitable may be determined by the systems development context at hand, because every systems development context is unique. Information is a valuable asset in today?s organizations, and it needs to be protected against both internal and external security threats. In our essay we aspired to find and present suggestions as to how systems developers can include security in the very design based on formalised systems development methods to create systems that are better prepared to meet the security challenges of today.

Klimatförändringar som ett säkerhetshot. En studie av internationella organisationers säkerhetisering av klimathoten

International organizations are important actors on the stage of world politics, and how these actors securitize the climate change issue is of importance for how it will be tackled by actors on global and national levels. The purpose of this study is to contribute to research on climate security discourses and how climate change is defined as a security concern amongst different actors. This study, in contrast to previous research, focuses on systematically mapping the definitions made by different international organizations by asking: whose security is at stake; who is responsible for responding to the threat; how is the nature of the threat defined; and what responses are suggested? By analyzing material consisting of a variety of documents and statements from five international organizations, I aim to identify differences between these actors ? in how the climate change issue is conceptualized from a security perspective. The result of the study shows that only one of the organizations shows clear elements of the national/geopolitical security discourse, while all of the other actors primarily use the human security discourse.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

The mobility of employees within the EU, and the Eures Network

En sammanfattning av uppsatsen på maximalt 8000 tecken.This thesis is mainly dealing with the mobility of the employees within the borders of the European Union. Legislative framework from the EU is favourable and the Commission has set as one of it goals to promote the migration. Globalisation trends and contemporary business concepts need people who are mobile on the other hand. But migration numbers are still low within Europe. The purpose of this thesis is to find out how much the legal uncertainties, and the different culture mentality in the workplace of another country act as barriers in the minds of the people who wish to work abroad.

En förändrad värld, en omdanad säkerhet? - En studie om klimatförändringars effekt på svensk säkerhetspolitik

The concept of national security has been a matter for debate during recent years, especially in academic fields. Criticism has surfaced since the end of the cold war, directed towards the traditional perspective's dogmatic focus on armed threats and interstate war. Questions concerning an oncoming paradigm shift have been raised, regarding a widening of the security agenda among national states to also include alternative threats, such as environmental hazards. In this thesis, the focus lies on the effects that climate changes have caused in the Swedish national security agenda during the last 15 years. Swedish policy documents show that there have been some major changes, not only the widening of the security agenda but the entire security domain seems to have changed.

Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer

This essay conducts a descriptive analysis of the ideas expressed by NATO´s official security strategy "Strategic Concept" from 2010 and the European Union?s security strategy "A Secure Europe in a Better World" from 2003. The purpose of this analysis is to examine whether the ESDP and NATO are compatible with each other when it comes to the role of security policy actor. To do so, I´ve chosen to analyse the actors' security strategies based on three dimensions. These dimensions are: Their view of the international scene, their views on cooperation and their views on how to reach security.

Finanskrisens påverkan på Stockholmsbörsens volatilitet : En jämförande studie

The network with its virtual business structure challenge the established vertical business structure. Part of the network theory that has developed focuses on relationships that forms B2Bnetworks. One way to create a B2B-network is for independent businesses to form a organization promoting co-operation. For co-operation to be successful it requires well thought-out actions, but a lack of how these actions are implemented have been noticed. This study explores how encouragement of co-operation can be done practically.

Kartläggning av nätförlusternas storlek inom Mälarenergis elnät

Energy losses are an essential part of a power grid company?s costs. From anenvironmental and economic perspective, it is important to reduce these costs. Toknow where efforts should be deployed, it is important to have good knowledge ofwhere in the network losses are situated. When creating network tariffs, there is alsonecessary to have a correct distribution such that the network customers that use acertain part of the network, only pays for the network losses in this area.

EU:s grannskapspolitik i Medelhavsregionen : En säkerhetspolitisk analys av Medelhavssamarbetet

AbstractThe thesis investigates how the European Union promotes stability and security in the Mediterranean region. The aim is to analyse the European Union?s security ambitions with Euro-Mediterranean Partnership, the Barcelona Process. An analytical framework with five sectors (military, political, economic, environmental and societal), based on the Copenhagen School?s theories about security sectors and securitization, is used for the analysis.

Samarbete i nätverk : En studie om hur främjande av samarbete realiseras i ett orkestrerande affärsnätverk

The network with its virtual business structure challenge the established vertical business structure. Part of the network theory that has developed focuses on relationships that forms B2Bnetworks. One way to create a B2B-network is for independent businesses to form a organization promoting co-operation. For co-operation to be successful it requires well thought-out actions, but a lack of how these actions are implemented have been noticed. This study explores how encouragement of co-operation can be done practically.

Lika men ändå olika ? revisorns nätverk i stora byråer

Auditing demands knowledge in many diverse areas. To be able to provide all this knowledge it is necessary for the auditor to have access to persons with special skills. Through these contacts the auditor builds up a business network that brings support in the daily work. Our purpose with this study is to find out how auditor?s network in big auditing firms is organized and to show how they use their network.

Attrahera, främja och behålla kvinnorna i IT-branschen : En studie om det kvinnliga nätverket Geek Girl Meetup

The aim of this study is to examine the conditions for participation in women's networks for the members of the Geek Girl Meetup network, to expose the members' perceptions of the IT industry and to highlight the network's impact on women's situation in the IT industry. The empirical material consists of interviews and a survey. The interviews were carried out with the network leaders for a better understanding of the network structure and why it exists. The survey completed by the members illuminates how the members perceive the networks function in the IT industry and what kind of an impact the network has on the members and if it has any at all. The result of the study shows that participation in networks like Geek Girl Meetup can be a model for promoting gender equality and improving conditions for women in the IT industry.

Fo?rutsa?ttningar fo?r AU som sa?kerhetsgemenskap avseende inomstatliga konflikter med transnationell inblandning

The theory of ?security communities? is generally understood as ?dependable expectations of peaceful change? between groups and whether or not the African Union can be said to meet that criteria has been contested in the research community. One of the central disagreements lie in the nature of the region?s conflicts, of which a majority are intrastate but with tendencies of transnational involvement. This paper seeks to understand how extensive this involvement is and how it affects the possibility of classifying the African Union as a security community.

<- Föregående sida 4 Nästa sida ->