Sök:

Sökresultat:

2207 Uppsatser om Security and defence cooperation - Sida 15 av 148

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

EU:s normativa makt inom miljöområdet : En fallstudie om EU:s roll i det globala klimatarbetet

Over the past twenty years, the cooperation within the European Union (EU) has strengthened and expanded with both more number of Member States and stronger influence on international politics. The unique character of the Union and its ability to enforce peace and humanitarian intervention has attracted attention in political science. This prominent position of the Union is perceived by many scholars who often hold this derived from the Union's influence in international relations. Various terms have been used to define the powers of the Union. The British researcher Ian Manners states that the unique identity of the Union in the international arena is formed by its normative power.  An important policy area within the Union is the environmental cooperation.

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Interorganisatorisk ekonomistyrning i nära relationer : En fallstudie av relationen mellan ett stort köpande företag och två av dess viktigaste samarbetspartners

Title: Interorganizational accounting in close relations ? A case study of the relation between a big purchasing company and two of their most important cooperation partners Course: Master thesis in Business and Administration within Accounting, 30 ECTS Advisor: Gun Abrahamsson Theoretical framework: This thesis uses theories of business relationships, management information systems and interorganizational accounting. Conclusions: Despite a difference in the relations the interorganizational accounting is designed and used in a similar way. The interorganizational accounting that exists in the two relations has a medium scope, fast timeline, high aggregation and high integration. The information is mainly used for attention directing and for decision making.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Inkluderande ?garskap i varierande demokratiska kontexter: En j?mf?rande fallstudie av svenskt utvecklingssamarbete med Rwanda och Tanzania

This thesis investigates how recipient countries' domestic type of democracy affects its inclusive ownership in international development cooperation. This is done by examining Swedish development cooperation with Rwanda and Tanzania during the period from 2010 to 2014, a time when ownership - a concept which emphasizes recipient countries' leadership over its own development - was a central part of the international development agenda. The two cases were selected through a most similar case design where the value of potential explanatory variables was similar, except for the recipient countries' types of democracy. Furthermore, the case study uses a comparative analysis to analyze strategies and reports done by SIDA and the Swedish Ministry of Foreign Affairs. Previous research focuses on the exclusion that national ownership can result in, in undemocratic national contexts. The main argument for this should be seen as the fact that ownership can not be representative if the power of the recipient's development agenda is limited to a decision-making elite.

Informationskrigföring : den nya teknikens hot

The new information society has revolutionised almost the entire world. But the new technique does not only bring good. That which was before only available on paper may today only be available on a computer system. This makes it possible to send data electronically. In the wrong hands that information can become a threat against the security of an individual, a company or even a nation.

Entreprenörernas åsikter om Sydveds samarbetsförmåga :

This report is the result of a questionnaire survey done in cooperation with the company Sydved and their contractors. The investigation concerned all their ordinary contractors. The main goal with the study was to find out the contractors opinion about the current cooperation conditions with Sydved, their opinion about the future and how to improve the cooperation. All contractors got a questionnaire to fill in and return within a given date. The percentage of answers was 48 % at the first stage and further 11 % answered after reminder. The result of the investigation indicated that the contractors in general have a positive attitude to Sydved and the way that the company acts.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Samarbete och nätverksbyggande över kommunens gränser : En studie om Norrköpings kommuns medlemskap i Sweden Emilia Romagna Network utifrån ett aktör-nätverksperspektiv

Social networks have increased significantly during the latest decades, but what does the cooperation include and how does the network processes look like? Networks are not specific for communities in the 2000?s or for that matter human organisations, but the ability to build networks and introduce more actors to the organisation have become easier with today?s communication technology. The study is about the Norrköping Municipality membership in the transnational network Sweden Emilia Romagna Network (SERN). It gives an insight into how networking and cooperation can be seen by politicians and officials, based on mission statements and the reason why a municipality choose to participate in transnational networks. The study aims to examine how Norrköping Municipality uses the SERN network and what the network have resulted in since the beginning of the municipality membership in 2005. It is a qualitative study which involves interviews with officials and politicians from the Municipality of Norrköping and textual material from SERN?s strategy documents and policies.

Small-worlds och rich-clubs bland bloggar : En nätverksanalys av den svenska bloggosfären under FRA-debatten 2008

Purpose/Aim: To find power structures within the blog network.Material/Method: Using keywords to find all available blog posts about the National Defence Radio Establishment from the blog search engine Twingly, and thereafter using the same blog search engine to find inlinks from other blogs, to those posts. The data is set into the context of the small-world networks models of Duncan J. Watts and rich-club models of Sergi Valverde och Ricard V. Sole.Main results: 5183 unique blogs have written about the subject in 22779 blog posts to which 28128 inlinks from other blogposts are made. Just over one fifth of the blogs are linkted to each other in one big network, where the remaining blogs stand without any ingoing or outgoing links.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

<- Föregående sida 15 Nästa sida ->