Sök:

Sökresultat:

124 Uppsatser om Predator attacks - Sida 2 av 9

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

Brandväggar för hemmakontor

Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable.

EU:s kamp mot terrorismen : Ett hot mot dess egna värdegrunder?

The aim of this study is through a policy analysis to illuminate the decisions that the EU has taken to respond to the terrorist attacks in the US, Madrid and London and through this analysis try to explain the problem of each decision and find out if these decisions might risk the individual rights of the European Union?s citizens.In order to reach this purpose the following questions are to be answered: In what way has the EU?s decision-making process, regarding its fight on terrorism, been affected by the terrorist attacks in Madrid and London? What consequences may the EU?s decisions against terrorism have on the individual rights?The method that has been used is qualitative studies of literature and the main material is overarching policy documents from the EU.The conclusions are that the bombings in Madrid and London have increased the speed of the decision-making process and more areas have been included in the union?s fight against terrorism. If individual rights are at risk by the union?s decisions there are reasons to be concerned. But my conclusion is that the European Union has to have strong and effective instruments to answer to the threat of terrorism..

Examining Accuracy : Drönare och drönarangrepp: retorik, praktik och historia

The military conflicts of the early 21st century have seen the introduction and rise of a new military technology: the armed drone. With the United States acting as the driving force behind this technological advancement, the U.S Air Force and intelligence agency CIA have madedrones their weapon of choice for pursuing suspected terrorists and insurgents in various remotelocations. American military leaders and policy makers assert that the armed drone?s high levelof accuracy make it the best available weapons platform for this task. However, new researchshows that the use of drones may result in more civilian casualties than previously thought, andmay in fact be more fallible than conventional aircraft in this respect.

Statsförfall ? Transnationellt terroristskydd eller temporärt gömställe?

Many theories describe failed states as potential threats to international security due to the breeding ground they constitute for transnational terrorism. Ken Menkhaus believes however that transnational terrorists are dependent on a state for their own protection in order to be able to operate.This essay seeks out the relevance in Ken Menkhaus? theory which states that transnational terrorists rather exploit corrupted states than operate in countries where there is a state collapse. His theory will be applied on a case study on post-Libya after Gadhafi?s fall.

Stresseffekter hos får vid vallning och hantering

Vallhundar används av fårproducenter som ett arbetsredskap i den dagliga hanteringen av fåren, såsom vid flyttning, hämtning eller då enskilda individer ska separeras från flocken. Det finns många olika vallhundsraser och border collien är en av de vanligaste som används. Vid vallning utnyttjas fårens vilja att samla sig till en flock vid närvaro av predatorer. Vid stress hos får uppkommer ofta ett förändrat beteendemönster. Vid närvaro av en upplevd predator, till exempel en hund eller främmande människa, bräker djuren mindre än vanligt och stampar i marken.

Säkerhetsstandard för ett mjukvarubaserat säkerhetselement

Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.

Organiserad brottslighet och terrorism : En komparativ diskursanalys av synen på dessa fenomen i svenska riksdagstryck

The aim of this study was to find out if the use of the concepts ?terrorism' and ?organized crime' has changed after the event on 11 September, 2001 when terrorists attacked World Trade Center and Pentagon. In this study I make use of discourse theory in a way which is inspired by the writings of Winther Jorgensen and Phillips. Knowledge acquired through this research has been primarily generated from two Swedish Government Official Reports concerning questions arising from introducing secret police surveillance. In these reports, there are many opinions from authorities whom have given their thoughts on introducing new ways of policing which are very interesting to analyze.

Brunbjörnens (Ursus arctos) inverkan på den nya svenska älgförvaltningen

The European Brown bear (Ursus arctos) has gone from basically being extinct in Sweden to, 2008 being estimated to a total of 3298 individuals. When looking at the new Swedish moose management system it is important to have an ecosystem-based approach and therefore include all the parts that moose impacts on and from in the management, especially the brown bear. Primarily in the spring and early summer the brown bear is a significant predator on moose calfs which must be taken into account in moose management. When the bear recolonize areas that it has previously been eradicated from, it will once again come in contact with people who are not accustomed to the bear's role in the ecosystem. We studied three groups of moose management areas with different predation by bears.

Att Visualisera Oron : Hotet, subjektet och terrorattentatet i Stockholm 2010

This study examines which socially constructed threats and subjects of security existed during the aftermath of the terrorist attacks in Stockholm 2010. With ideas of identity and difference as a starting point the theoretical framework is then developed with ideas from the new critical security studies including key subjects such as attributes, risk, imaging and visualisation. The study will be executed with the use of a discourse analysis approach using newspaper articles and chronicles as the principal empirical material. The analysis will then follow two separate themes. Firstly, the different threats and subjects of security will be deduced, and also, how these social constructions inevitably create each other and require each other to continue existing.

Attacks on humans in Sweden by bear, wolf, lynx, wolverine, moose and wild boar in relation to Swedes? fear for these animals

It is not easy to understand people?s fears since they are not always a logical reflection of the danger in certain situations. This study is an attempt to give a scientific view of the potential danger that certain animals in Sweden pose and compare this to Swedes? fear of these animals. A report shows that Swedes? have a certain amount of fear for being attacked by a wild animal in the forest and this fear has increased for certain animals over the last years.

Att förklara det oförklarliga : En kritisk diskursanalys av svensk press nyhetsrapportering från attentaten i Oslo och på Utøya 22 juli 2011

This study examines how Sweden?s four biggest newspapers deal with the attacks in Oslo and on Utøya the 22nd of July 2011. This date, where the ethnic Norwegian Anders Behring Breivik, bombed the goverment headquarter and killed 69 people at a political camp, will be remembered for a long period of time.  With its critical perspective, this study examines a total of thirteen news articles published within eight days after the attacks in Oslo and on Utøya, to see in what way the Swedish news papers constructs Breivik as a person. Furthermore the study examines in what way the Swedish newspapers makes connections to Sweden and to what extent speculation is used in the news articles. The theoretical premises for the study are the critical discourse analysis, and key elements within it that is used are ideology, discourse and micro- and macro analysis. The conclusion shows that Swedish newspapers are disposed to construct Breivik as a unique individual who falls outside the normative scopes in their explanations of a murderer or a terrorist.

Säker grannupptäck i IPv6

The IPv6 protocol offers with some new functions, one of them is auto configuration. With auto configuration it is possible for nodes, i.e. hosts and routers, for automatically associated with IPv6 addresses without manual configuration. Auto configuration it is another protocol as it uses Neighbor Discovery protocol (ND) messages (ND is mandatory in the IPv6 stack). The main purpose of ND is that nodes can discover other nodes on the local link, perform address resolution, check that addresses are unique, and check the reachability with active nodes.There are exactly the same vulnerabilities of IPv6 as IPv4 and is now exception, ND if not properly secured.

Större gädda (Esox lucius) konsumerar inte storspigg (Gasterosteus aculeatus) : Är taggarna ett problem eller är spiggen för liten?

Övergödningen i Östersjön har varit ett problem de senaste årtionden vilket påverkar akvatiska organismer och minskar undervattenvegetationen som är viktig för fisklivet. Gädda (Esox lucius) och abborre (Perca fluviatilis) har minskat i Kalmarsund och Blekinge skärgård de senaste 20 åren samtidigt som spigg (Gasterosteus aculeatus) har ökat kraftigt. Anledningen till ändrat förhållande mellan arterna är inte helt klarlagd men spigg kan vara en art som påverkar ekosystemet genom sin konsumtion av ägg från predatorerna; gädda och abborre. Reduktionen av dessa predatorer bidrar till trofisk kaskad där algblomningar gynnas. Spigg har en direkt försvarsmekanism i form av vassa taggar på rygg och sida som är ett effektivt skydd mot vissa predatorer. Forskning visar att mindre predatorer upp till 25 cm inte konsumerar spigg beroende på taggarna.

Informationskrigföring : den nya teknikens hot

The new information society has revolutionised almost the entire world. But the new technique does not only bring good. That which was before only available on paper may today only be available on a computer system. This makes it possible to send data electronically. In the wrong hands that information can become a threat against the security of an individual, a company or even a nation.

<- Föregående sida 2 Nästa sida ->