Sök:

Sökresultat:

238 Uppsatser om Parallell attack - Sida 3 av 16

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Lyftkraftsberäkning för vingprofiler: Virvelpanelmetoden

The problem presented in this report is that of finding a method to calculate the lift force from a single-element airfoil of arbitrary shape. A number of restrictions are used in order to simplify calculations while retaining reasonable accuracy. The problem is solved for the two-dimensional case only and no finite-wing effects are taken into account. Furthermore, inviscid and incompressible flow is assumed. The method used to solve the problem is the vortex panel method, with vortex singularities distributed over simplified airfoil geometry.

Utrikespolitik och krig : En fallstudie om USA:s invasion av Irak utifrån neoklassisk realism

In this essay i argue that there are three different variables that may be able to control the outcome of certain foreign policy choices. These three variables are External Threats, government division and public opinion. The Essay also tries to identify former president Bush motives behind the 2003 Iraqi War. It is partly argued that the three variables had a certain amount of influence on Bush decision making process. But the main focus lies on the motives behind the attack.

Modellering av delvis kända objekt med hjälp av bilder

Today many different types of lock systems are used all over the world. Passwords, finger prints and magnetic strips are a few examples. When the key is a three dimensional object, lika a physical metal key, the security depends, in a high degree, on that you can?t copy the object without access to it. One approach to copying the object is photographing the object, and from these photographs create a copy.

En retorisk provokation : Om förolämpningar, satir och karikatyrer

When is it acceptable to make fun of religion, and when does it become disrespectful? On January 7, 2015, the headquarters of the French satirical news paper Charlie Hebdo was subjected to a terrorist attack that claimed the lives of 12 staff members, due to the publishing of caricatures picturing the prophet Muhammed. The reactions that followed the attack circled around two perspectives; the importance of freedom of expression and the obligation to show respect for certain institutions and traditions in society. How come the caricatures can elicit such completely different reactions? This is the question that this thesis uses as a starting point for the examination of the subject caricatures and satire.

Social Ingenjörskonst : En studie i modern IT-brottslighet

Social ingenjörskonst är ett stort hot mot informationssäkerhet. Den här uppsatsen undersöker hur en attack går till, vilka som utgör hotet och vilka som utgör måltavlor, samt hur attackerna kan förebyggas. Hackaren framställs ofta som en ung man som drivs av nyfikenhet och får kickar av att manipulera och stjäla information. Den sociala ingenjören besitter även förmågan att manipulera människor på ett sätt som den traditionella hackaren saknar. Många spelar på mottagarens medkänsla, tacksamhet, lojalitet eller respekt för auktoriteter för att vinna förtroende. I takt med att den tekniska säkerhet förstärks är det troligt att fler väljer att använda människor istället för tekniken när de utför en attack.

Turkiet, AKP och Israel : En studie av en utrikespolitik i förändring

Turkey has often been described as a cultural and geographical bridge between West and East. When the Islamic AKP came to power in Turkey 2002 many critics feared that the country was going to abandon its former Western allies and strengthen their relations with the Arab world instead. The criticism was intensified when the AKP increased Turkey?s bilateral relations with the Middle East and moved closer to former foe?s like Iran and Syria, at the same time as their long-time friendship with Israel experienced serious crisis. The aim and purpose of this thesis is to describe and explain the change in AKP?s foreign policy towards Israel.The research method is a combination of a qualitative text analysis of Turkey?s speeches in the UN General debate and Jakob Gustavsson?s model for explaining foreign policy change.The results show that the Turkish-Israeli relations have deteriorated after the Israeli attack on the Gaza Freedom Flotilla in 2010, particularly regarding diplomatic relations and military agreements.

Uppföljning av patienter med Transitorisk Ischemisk Attack (TIA)- och minor stroke som medverkat i TIA-skolan på Enköpings lasarett

The purpose of this study was to investigate how patients who had undergone Hallberg's  TIA-school at Enköpings Lasarett rate their physical and mental health 18 months after participation. Another purpose was to examine whether they re-diagnosed with a TIA or suffered a stroke. The design of the quantitative study was longitudinal and descriptive. In the study 16 patients participated and to measure their mental and physical health the questionnaire SF36 was used. The results showed that none of the participants suffered a new TIA or stroke since participation in the TIA-school.

Attacks on humans in Sweden by bear, wolf, lynx, wolverine, moose and wild boar in relation to Swedes? fear for these animals

It is not easy to understand people?s fears since they are not always a logical reflection of the danger in certain situations. This study is an attempt to give a scientific view of the potential danger that certain animals in Sweden pose and compare this to Swedes? fear of these animals. A report shows that Swedes? have a certain amount of fear for being attacked by a wild animal in the forest and this fear has increased for certain animals over the last years.

Superhjälte eller hjälplöst offer? Vem är vem? : En genusstudie av kvällspressens offerkonstruktioner efter skjutningen på Utöya.

On July 22nd 2011, there was a terrorist attack in Norway. First a bomb exploded in the Parliament House, in Oslo; and shortly after that a man shot 69 politically active young people at a camp on the island Utöya. Throughout the weeks to follow, we could read about the victims' stories. They told of tears, fear and heroism. But who got to tell what? The purpose of this study was to see how the Swedish tabloids described the victims from a gender perspective.

Fysisk aktivitet på recept® som del av behandling efter transitorisk ischemisk attack

Transitorisk ischemisk attack (TIA) är en allvarlig förvarning till stroke som kan förorsaka både omfattande funktionsnedsättning och död. Det finns idag stark evidens för att fysisk aktivitet har en viktig roll i prevention av stroke. Fysisk aktivitet på recept® (FaR), är en metod som numera används i vården för att stimulera till ökad fysisk aktivitet. Syfte: Syftet med studien var att undersöka hur personer som har drabbats av TIA upplevde att bli ordinerade FaR®, i vilken utsträckning de följde receptet och hur deras fysiska kapacitet påverkades av interventionen. Metod: Fem personer som varit inlagda vid Piteå älvdals sjukhus på grund av TIA deltog i studien.

<- Föregående sida 3 Nästa sida ->