Sök:

Sökresultat:

416 Uppsatser om Parallel attack - Sida 2 av 28

Social-engineering ett hot mot informationssäkerheten?

Den här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvaraeller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hotfarligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineeringutan att de själva vet om det.Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativakonsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att enorganisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. Ivärsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda föroaktsamhet och sitter i fängelse.Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessahot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olikaförklädnaderna en utövare av social-engineering antar..

Parallel Import of Pharmaceuticals in the EU

Parallel import in the European Union is the perfectly legal activity under Art. 28-30 EC of buying goods in a low-price country in order to ship and sell them in a high-price country. The pharmaceutical market in Europe is subject to the subsidiartiy principle of Art. 5 EC and heavily characterised by national regulations that lead to significant price differentials between – generally speaking – Northern and Southern Europe. This incites the activity of parallel traders in the first place, who act as arbitrageurs.

Parallel Import of Pharmaceuticals in the EU

Parallel import in the European Union is the perfectly legal activity under Art. 28-30 EC of buying goods in a low-price country in order to ship and sell them in a high-price country. The pharmaceutical market in Europe is subject to the subsidiartiy principle of Art. 5 EC and heavily characterised by national regulations that lead to significant price differentials between ? generally speaking ? Northern and Southern Europe.

Kompetensutveckling och lärande på Samhall i Dorotea

Samhall arbetar aktivt mot målsättningen att varje år få fem procent av sina anställda att göra övergångar till andra anställningar utanför sin verksamhet och på Samhall i Dorotea har det arbetet varit framgångsrikt. Syftet med detta examensarbete var att undersöka vilka psykologiska faktorer som har legat till grund för att Samhall i Dorotea har lyckats bra med att slussa ut anställda till andra verksamheter med fokus på vilka förutsättningar för lärande och kompetensutveckling det finns i organisationen samt vilken motivations¬potential arbetsuppgifterna har. På Samhall i Dorotea har ett projekt i ökad arbetsväxling och kompetens genomförts, Attack 2005, och en analys av vilken betydelse Attack 2005 har haft för verksamheten har även gjorts. Arbetets teoretiska utgångspunkt utgörs av Ellströms (1992) teori om faktorer i organisationen som påverkar lärande och utveckling samt Hackman och Oldhams (1980) Job Characteristics Model. Intervjuer med nuvarande och tidigare anställda på Samhall i Dorotea har genomförts och resultaten visar att det positiva arbetsklimatet och ett välfungerande samarbete i arbetsgrupperna är två betydande framgångsfaktorer.

Inverse Discrete Cosine Transform by Bit Parallel Implementation and Power Comparision

The goal of this project was to implement and compare Invere Discrete Cosine Transform using three methods i.e. by bit parallel, digit serial and bit serial. This application describes a one dimensional Discrete Cosine Transform by bit prallel method and has been implemented by 0.35 ìm technology. When implementing a design, there are several considerations like word length etc. were taken into account.

Behaviour and throughput of dairy cows when entering and exiting two types of parallel rotaries

Today a trend can be seen towards fewer dairy farms and increasing number of cows per farm. Larger farms set a higher demand of more labour efficient milking systems. The time to enter and exit milking rotary platforms is crucial to maintain a high cow throughput. This study is a project initiated by DeLaval in order to evaluate the cow throughput and cow behaviour during entry and exit in two types of parallel external rotaries with different bail designs. The two rotaries compared were DeLaval parallel rotary PR2100 and PR3100HD.

Överraskning ? Tidlös eller totalt omkastad?

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

Revisorers perspektiv på implementeringen av ett nytt regelverk : ? fallet komponentavskrivningar enligt regelverket K3

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Lyftkraftsberäkning för vingprofiler: Virvelpanelmetoden

The problem presented in this report is that of finding a method to calculate the lift force from a single-element airfoil of arbitrary shape. A number of restrictions are used in order to simplify calculations while retaining reasonable accuracy. The problem is solved for the two-dimensional case only and no finite-wing effects are taken into account. Furthermore, inviscid and incompressible flow is assumed. The method used to solve the problem is the vortex panel method, with vortex singularities distributed over simplified airfoil geometry.

<- Föregående sida 2 Nästa sida ->