Sökresultat:
2724 Uppsatser om Security standard - Sida 8 av 182
Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN
This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.
Biståndshandläggares uppfattning av begreppet skälig levnadsnivå och handlingsutrymme. : En kvalitativ studie.
Our aim of this study is to analyze how the concept of reasonable standard of living is by assistance officers in geriatric care, as well as the impact of their discretion on the assessment. We conducted a qualitative study with the help of interviews. During the collection of the empirical material, we have experienced greater confusion among assistance officers opinion about the concept of reasonable standard of living. We lacked a clear answer to the concept content. The interview subjects' responses did not differ so much, they said, among other things, that the concept is difficult to interpret, fuzzy, or that they do not have a good understanding of it.
peer2peer - hur dyrt är gratis?
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas
med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas
spyware alternativt adware, misstänks för att samla in personlig information,
så som e-mailadresser och lösenord. Det föreligger en risk att informationen
sedan säljs vidare eller används för att exempelvis rikta reklam....
Den europeiska arresteringsordern : ett rättssäkert förfarande?
The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.
Bristfällig säkerhet inom trådlösa routrar med fokus på WPS
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..
Trådlös kommunikation för Anybus
The industry struggles with problems concerning physical damage to wiresand communication in remote areas. Introducing a wireless network canprovide a solution to these issues. However, introducing wirelesscommunication comes with a whole new line of problems that will becovered in this report. By utilizing the wireless communication standardIEEE 802.11 a product can easily be integrated into an existing wiredEthernet network (IEEE 802.3).An introduction to the standard IEEE 802.11 and a summary of existingproducts utilizing the standard for embedded systems will be giventhroughout the report. This report also tries to explain key parameters forwireless communication in an industrial environment.This project also consists of a design and an implementation part, where thechosen IEEE 802.11 standard will be integrated into the existing wiredAnybus-S Ethernet module from the company HMS Industrial Networks.The integration part of the project has resulted in a working prototype calledAnybus-S Ethernet Wireless that utilizes the IEEE 802.11b/g standard fortransferring data.The project has been really fun to participate in and it has been successful inthe terms that a working prototype exists, and the authors have gained theknowledge in the subject as intended..
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information.
Much of the information is confidential and should not be read by those not
privileged. To protect the information from unauthorized access cryptography
can be applied. The cryptography algorithms in use today all have their pros
and cons. They are therefore suited for different applications.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
XML som informationsbärare för EDI
Information handling has been a key issue for different companies for a long
time. Electronic Data Interchange (EDI) is used to transfer different business
documents from one company to another. This is done in such way that the
information itself is separated from how this information is stored and handled
in the companies internal systems. As different companies have different
systems there is a need for a standardised format for this exchange.
There is a big difference between EDI-systems based on what kind of
EDI-standard is used. The most common standard in Europe is EDIFACT, but with
increased interest of using the Internet for business communication there is a
need for a standard that is adjusted for use over the Internet.
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
SmartMedia-controller på chip
This report deals with the design of a controller for SmartMedia? flash memory cards, based on a hardware description found in the SmartMedia? Interface Library - SMIL. The design was made on logic gate level, using standard cells in OrCAD Capture. After simulation of the design in PSpice A/D, it was exported as an EDIF netlist, which was used to make a chip layout in L-Edit, a layout tool for making integrated circuits. The layout was made using a method called Standard Place and Route - SPR, where the layout tool places standard cells from a library and connects them according to the EDIF netlist.
Försvarsmaktens Fysiska Standard : hur uppfattar officerarna på Artilleriregementet A9 att det genomförs?
Denna uppsats behandlar ämnet Försvarsmaktens Fysiska Standard. Uppsatsens syfte är att skapa ett underlag för att förbättra eller bibehålla möjligheterna för officerarna vid Artilleriregementet A9 att genomföra Försvarsmaktens Fysiska Standard (FM FysS). Detta för att uppfylla de krav som ställs avseende fysisk prestationsförmåga på en officer i Försvarsmakten. Den frågeställning som använts är Hur uppfattar officerarna på A9 att de genomför FM FysS?Den metod som använts är en enkätundersökning som genomförts bland officerarna på A9.Resultatet från enkätundersökningen visar att det finns både positiva delar som bör bibehållas och förbättringspunkter för genomförandet av FM FysS.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.