Sök:

Sökresultat:

2724 Uppsatser om Security standard - Sida 3 av 182

Design comparison between HiperLAN/2 and IEEE802.11a services

This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards.

Säkerhetstänkande integrerat i systemdesign via formaliserade metoder

Systems development methods mirror different organizational perspectives, and not all methods are formalised, but what they have in common is the purpose of structuring and supporting systems development processes. Which method would be the most suitable may be determined by the systems development context at hand, because every systems development context is unique. Information is a valuable asset in today?s organizations, and it needs to be protected against both internal and external security threats. In our essay we aspired to find and present suggestions as to how systems developers can include security in the very design based on formalised systems development methods to create systems that are better prepared to meet the security challenges of today.

Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.

Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

Klimatförändringar som ett säkerhetshot. En studie av internationella organisationers säkerhetisering av klimathoten

International organizations are important actors on the stage of world politics, and how these actors securitize the climate change issue is of importance for how it will be tackled by actors on global and national levels. The purpose of this study is to contribute to research on climate security discourses and how climate change is defined as a security concern amongst different actors. This study, in contrast to previous research, focuses on systematically mapping the definitions made by different international organizations by asking: whose security is at stake; who is responsible for responding to the threat; how is the nature of the threat defined; and what responses are suggested? By analyzing material consisting of a variety of documents and statements from five international organizations, I aim to identify differences between these actors ? in how the climate change issue is conceptualized from a security perspective. The result of the study shows that only one of the organizations shows clear elements of the national/geopolitical security discourse, while all of the other actors primarily use the human security discourse.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

En förändrad värld, en omdanad säkerhet? - En studie om klimatförändringars effekt på svensk säkerhetspolitik

The concept of national security has been a matter for debate during recent years, especially in academic fields. Criticism has surfaced since the end of the cold war, directed towards the traditional perspective's dogmatic focus on armed threats and interstate war. Questions concerning an oncoming paradigm shift have been raised, regarding a widening of the security agenda among national states to also include alternative threats, such as environmental hazards. In this thesis, the focus lies on the effects that climate changes have caused in the Swedish national security agenda during the last 15 years. Swedish policy documents show that there have been some major changes, not only the widening of the security agenda but the entire security domain seems to have changed.

Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer

This essay conducts a descriptive analysis of the ideas expressed by NATO´s official security strategy "Strategic Concept" from 2010 and the European Union?s security strategy "A Secure Europe in a Better World" from 2003. The purpose of this analysis is to examine whether the ESDP and NATO are compatible with each other when it comes to the role of security policy actor. To do so, I´ve chosen to analyse the actors' security strategies based on three dimensions. These dimensions are: Their view of the international scene, their views on cooperation and their views on how to reach security.

EU:s grannskapspolitik i Medelhavsregionen : En säkerhetspolitisk analys av Medelhavssamarbetet

AbstractThe thesis investigates how the European Union promotes stability and security in the Mediterranean region. The aim is to analyse the European Union?s security ambitions with Euro-Mediterranean Partnership, the Barcelona Process. An analytical framework with five sectors (military, political, economic, environmental and societal), based on the Copenhagen School?s theories about security sectors and securitization, is used for the analysis.

Fo?rutsa?ttningar fo?r AU som sa?kerhetsgemenskap avseende inomstatliga konflikter med transnationell inblandning

The theory of ?security communities? is generally understood as ?dependable expectations of peaceful change? between groups and whether or not the African Union can be said to meet that criteria has been contested in the research community. One of the central disagreements lie in the nature of the region?s conflicts, of which a majority are intrastate but with tendencies of transnational involvement. This paper seeks to understand how extensive this involvement is and how it affects the possibility of classifying the African Union as a security community.

Reading the Common Foreign and Security Policy of the European Union in terms of the issue of Terrorism : An analysis on the evolution of the CFSP of the EU under the issue of Terrorism

In the post Cold-War era, world politics was transforming itself through its emerging complex issues such as terrorism and influential and interdependent actors such as the European Union. In this new era, the European Union was developing its Common Foreign and Security Policy pillar both to present a coherent and unified EU policy and to prove its political potent in order to become an influential actor on world politics. On the other side, security environment was also transforming its content through emerging actors and issues. As one of the most prominent actors of the world politics, the EU was influenced by the transformation of security environment, whose economic ?soft power? proved necessary but insufficient for being a global power in this emerging security environment.

Introduktion till icke-standard analys - Ett bevis av transferprincipen och en explicit konstruktion av Brownsk rörelse

I denna rapport konstrueras inledningsvis hyperreella tal från reella tal. Vi definierar aritmetik för skuggor av hyperreella tal och presenterar en icke-standard teori för serier och konvergens utifrån denna konstruktion.Förfarandet generaliseras sedan genom att skapa en icke-standard modell till matematisk analys utifrån en mängdteoretisk modell i ZF, som ett led i konstruktionen presenteras teori för filter och ultraprodukter. Vi visar sedan transferprincipen och bygger upp internalitetsbegreppet för att studera relationer mellan standard ochicke-standard modellerna för att kunna härledda standardresultat från icke-standard resultat. Avslutningsvistillämpas teorin för att skapa en explicit icke-standard konstruktion av Brownsk rörelse och vi ger ett bevis föratt denna konstruktion är ekvivalent med standard formuleringen..

Requirement Specification for Information Security to Health Systems, Case Study - IMIS

During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.

Mänsklig säkerhet i Sudan- För vem och mot vad?

The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

<- Föregående sida 3 Nästa sida ->