Sökresultat:
1934 Uppsatser om Network security - Sida 7 av 129
Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation
Offentliga trådlösa nätverk finns idag mer tillgängliga än någonsin. Samtidigt haralla dessa nätverk något gemensamt ? de går alla att avlyssna och risken finns attanvändarens information kan komma i fel händer. Uppsatsen behandlarallmänhetens säkerhetsmedvetenhet med avseende på denna typ av nätverk genomtvå undersökningar. Den första undersökningen sker via ett tekniskt experiment därdet på flera geografiska platser har erbjudits ett trådlöst nätverk till allmänheten.
Minivindkraftverks inverkan på lågspänningsnät
Micro-power wind energy convertors have recently increased in popularity. The reasons for this are among other things the increasing cost of electric energy and enviromental concern.In this thesis the connection of these micro-power wind energy convertors to the utility network is discussed. Electric standards for the connection of small production units is presented. Finally some calculations and measurements of electric quality are also presented. The utility network used in the calculations is part of Halmstad Energi och Miljö network..
Quality of Service i IP-nätverk
The original promise behind the Internet Protocol was to deliver data from a sender to the receiver using a best-effort approach. This means that the protocol makes no guarantees except that it will try to deliver the data to the destination. If some problem occurs the packet may be discarded by the network without any notice. No guarantees are made regarding the time it takes to deliver the data, the rate at which data will be delivered or if data is delivered in the same order it was sent. The best-effort approach is arguably the reason behind the success of the Internet Protocol and is what makes IP scalable to networks the size of the Internet.
Riskhanteringens utmaning : En studie som identifierar svenska organisationers riskhantering avseende informationssäkerhet samt dess prioritering.
Background: Risk Management plays an important part of the enterprises strategic business activity. Efficient Risk Management will secure the businesses survival, assets and creates market advantages. The interest of information security has consequently gained in Swedish corporations. Corporations have realized the importance of the information which is stored in the IT systems. IT is the tool for businesses future progress and growth and therefore a source of risks.
Säkerhetspolitik, Medborgare & Frihet
The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.
Informationssäkerhet i arkitekturbeskrivningar : En studie i hur säkerhetsfunktioner kan beskrivas med hjälp av vyer
Information security is an essential part of all information systems; especially in large organizations and companies dealing with classified material. Every large information system has an architecture that includes many parts that together form an Enterprise Architecture. The aim of this thesis is to study how to describe several security functions in an Enterprise Architecture and also how to ensure accountability between requirements and the implementation of the security functions. The description is for stakeholders on a conceptual level rather than a technical level. The study has been carried out by comparing the theoretical framework that has been formed by a study of the literature, and the empirical framework that has been formed by a group discussion and interviews with Information Security Consultants from Combitech AB.
Software keystroke logging : Automatisering av skydd mot software keystroke logging
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter.
STUDENTERS INFORMATIONSHORISONTER: Användning av Google och sociala nätverk i informationsökningsprocessen
The theses discuss information seeking with a focus on Google and social networks. Students attending the librarian program in Lund have been examined by means of two methods; diaries and information horizons, where they had to solve a specific assignment. The information horizon as a method contributes to getting a structural perspective on the information search process instead of viewing information search as a procedure. Information horizons use social network analysis.The aim of the theses is to investigate the importance of the social network in information search, with a particular focus on Google as a search tool. Our hypothesis is that Google acts as a compensator to the social network when the students search for information and in the educational program.The research indicates that there is no direct correlation between usage of the social network and usage of Google.
Riktlinjer för implementering av ISO 17799
An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.
Vapenhandel : En kontradiktion till EU:s utvecklingspolitik?
Arms trade is a multi-faced issue, it can increase the state's economic revenue; however also endanger the human security. The European Union's member state United Kingdom is one of the five largest arms traders in the world. The EU promotes human security in its work, especially in the union's development policies. These circumstances address the main question of the study: is there a contradiction between the UK's arms trade and the EU development policies. The objective of this study is to research the stately weapon use in three of the UK's trading partners, and how it could affect the EU development policies.
Flygvapnets Transformation : Fallstudie i flygutbildningens omtvistade placering
The transformation among armed forces in Europe is a consequence due to shifted security perspective and the growth of international security actors, such as NATO and the EU. Sweden has played an active role in EU to ensure its influence in forming the security policy for the organisation. Some studies mean it´s because of Sweden?s interest in strengthen EUs roll as a security actor they transformed their own armed forces to be able to take part in international operations. This transformation led to what can be called ?the Swedish defence dismantle? and some studies mean that it has led to the point where Sweden completely lacks the ability to defence themselves.The question is if the ambition to become an active member in these security organisations can explain all the decisions made throughout the Swedish defence-transformation, or if some decisions were made due to other factors?By studying the decision process leading up to the decision to locate the flight education to Malmen in Linköping this study seeks to answer why the decision was made.
Nätverkskommunikation för jämställdhet
AbstractTitle: Network communication for equal opportunities (Nätverkskommunikation för jämställdhet)Number of pages: 47 (54 with enclosures)Author: Hillevi GoodTutor: Ylva EkströmCourse: Media and Communication Studies DPeriod: Spring Semester 2007University: Division of Media and Communication, Department of Information Science, Uppsala UniversityAim: The aim of this essay is to study the possibilities to bring about change by the means of communication in two networks, focusing on the implementation of the Swedish Equal Opportunities Act.Material and method: The study draws on data collected in an electronic survey among representatives of two networks consisting of representatives from trade unions and employer?s associations. The material is analyzed using descriptive tools, cross tables and correlation matrices in which general characteristics as well as individual understandings of the network communication are presented and discussed.Main results: The general results indicate that the network communication serves important purposes, such as providing support and motivation for the members and changing attitudes towards equal opportunities. The analysis suggests that the network members have good communicative possibilities to serve as agents of change within their organisations. Moreover, there is an observed relation between, on the one hand, organizational context and, on the other hand, the network members? own communicational behaviour and their experienced possibility to influence their organizations.Keywords: network communication, diffusion of innovations, behaviour change, Equal Opportunities Act.
Hela min själ är fylld utav sår : En studie utifrån kvinnors egna upplevelser av att leva med självskadebeteende
This study intends to illuminate women?s experiences of their own self-harm. Self-harm is mostly associated with women and research shows that women mostly are over-represented. This study describes women?s experiences about their self-harm but also how they perceive the elements around them during their illness.
Möjligheternas land? En kvalitativ studie om ensamkommande barns upplevelser av att leva i Sverige
This study concerns unaccompanied refugee children and their experiences of living in Sweden and also their thoughts about identity and security. The aim of this study was to find a deeper understanding of these children?s situation. We formulated three research questions in order to obtain this deeper understanding:? What experiences do the informants have of living in Sweden?? What are the informants? views of their identity in their new life situation?? What is security to the informants?This is a qualitative study based on six semi-structured interviews with six youths whom have come to Sweden as unaccompanied refugee children.
Ser ni mer än bara min kropp? -Patienters upplevelser av trygghet under operation
ABSTRACTIntroduction: An increasing number of patients undergo surgery under local anesthesia and are thereforeawake during the procedure. Nursing care that is provided to these patients can differ from those thatreceive general anesthesia. Previous research has focused on patients? general experiences of being awakeintraoperative. But there is no research that focuses on patients perceptions of security.