Sökresultat:
1528 Uppsatser om Security features - Sida 4 av 102
Säkra kommunikationskanaler i en distribuerad heterogen miljö
The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Webbsystem för matprisjämförelser
This is a thesis project in the field of information technology which begins by evaluating existing food price comparison systems and subsequently aims to design an improved, web based system for said purpose. The system features interfaces for price reporting, price comparisons as well as various search and review functions. The objective is to create a system able to compete with existing price comparison systems, which requires careful selection of products that can be found in all foodstores that also represent different households; a user-friendly price reporting and price comparison interface and an efficient tool for ensuring the validity of reported prices.The designed system features a more accurate formula for calculating average prices in events where the real price is missing; a more reliable security mechanism forv alidation of reported prices and a more comprehensible interface for viewing price reports, reporting prices, reviewing stores and products in comparison with existing systems. The system does, however, suffer from some optimization issues primarily in the form of inefficient database modeling; SQL queries and JavaScript code although testing has shown that these shortcomings do not hamper overall performance to such a degree that usability is compromised. Further usability testing performed on the system with five test subjects shows that a high level of overall user-friendliness has been achieved even though some special features, such as the detailed report containing price information per product for each store need to be improved.It is not possible to say at this time whether or not the designed system will be able to compete with existing ones or if the very concept of food price comparisons per se is viable in terms of profitability and marketability.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet
The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.
Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter
In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.
När goda råd är dyra: En fallstudie av användandet av konsulttjänster i den ideella sektorn
A case study was done of Sthlm Policy Group, a consulting agency that mainly targets NGOs and government agencies in the peace and security sector. The goal of the case study was to explore the tendency of NGOs in Sweden to hire commercial consulting companies. The main interest was to see what the key reasons are for NGOs to hire private consulting agencies, but also to explore what problems that might be associated with such relationships. Interviews were carried out with representatives of the consulting agency, with its clients as well as with other NGOs that were identified as potential clients. The interviewed NGOs and government agencies were found to approve of the use of commercial consultants.
Lingvistik och användbarhet i sökmotorer
This is a master thesis from Uppsala University in collaboration with B Locket AB (more known as www.blocket.se). B Locket AB is a large ad-company from Sweden, located in Stockholm.Search engines on the market today are becoming more and more complex. When they were first introduced, they only had one function and that was to produce search results containing the string that the user had typed. Today, users want it to be able to spellcheck, produce more results and sort search results on specific fields as well. Preferably, all these features should not affect the performance as a whole.The reason to why these demands have come up is that users are getting more and more used to internet services as a whole and they want everything to be as easy as possible.The user ability has become a substantially more important area in the computer industry and this needs to be taken into account when it comes to B Locket AB and its search engine.