Sökresultat:
1117 Uppsatser om Wireless router security - Sida 6 av 75
Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter
Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..
Pneumatiska artificiella muskler : med hjälp av en robotarm
According to the study [1] several firefighters are killed in action each year. This happens naturally in various ways. One of the major factors is that firefighters often do not know how the environment looks like, for example that a building in an industrial area contains hazardous gas cylinders. Without a solution, fire-fighters will continue to die in duty. It is therefore important to solve this problem so that we can minimize the risks and save lives.The goal of this project was a control system for pneumatic artificial muscles.
Riskhanteringens utmaning : En studie som identifierar svenska organisationers riskhantering avseende informationssäkerhet samt dess prioritering.
Background: Risk Management plays an important part of the enterprises strategic business activity. Efficient Risk Management will secure the businesses survival, assets and creates market advantages. The interest of information security has consequently gained in Swedish corporations. Corporations have realized the importance of the information which is stored in the IT systems. IT is the tool for businesses future progress and growth and therefore a source of risks.
Säkerhetspolitik, Medborgare & Frihet
The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.
Informationssäkerhet i arkitekturbeskrivningar : En studie i hur säkerhetsfunktioner kan beskrivas med hjälp av vyer
Information security is an essential part of all information systems; especially in large organizations and companies dealing with classified material. Every large information system has an architecture that includes many parts that together form an Enterprise Architecture. The aim of this thesis is to study how to describe several security functions in an Enterprise Architecture and also how to ensure accountability between requirements and the implementation of the security functions. The description is for stakeholders on a conceptual level rather than a technical level. The study has been carried out by comparing the theoretical framework that has been formed by a study of the literature, and the empirical framework that has been formed by a group discussion and interviews with Information Security Consultants from Combitech AB.
TCP/IP i taktiska ad hoc-nät
TCP (Transmission Control Protocol) is a transport protocol designed for the wired Internet. In wireless networks packet losses occur more frequently due to the unreliability of the physical link. The main problem is that TCP treats all losses as congestion, which leads to a lower throughput. Ad hoc networks are multihop wireless networks of mobile nodes, where each node can allow other packets to pass through it. Topology changes often occur and may lead to packet losses and delays, which TCP misinterprets as congestion.
Vapenhandel : En kontradiktion till EU:s utvecklingspolitik?
Arms trade is a multi-faced issue, it can increase the state's economic revenue; however also endanger the human security. The European Union's member state United Kingdom is one of the five largest arms traders in the world. The EU promotes human security in its work, especially in the union's development policies. These circumstances address the main question of the study: is there a contradiction between the UK's arms trade and the EU development policies. The objective of this study is to research the stately weapon use in three of the UK's trading partners, and how it could affect the EU development policies.
Flygvapnets Transformation : Fallstudie i flygutbildningens omtvistade placering
The transformation among armed forces in Europe is a consequence due to shifted security perspective and the growth of international security actors, such as NATO and the EU. Sweden has played an active role in EU to ensure its influence in forming the security policy for the organisation. Some studies mean it´s because of Sweden?s interest in strengthen EUs roll as a security actor they transformed their own armed forces to be able to take part in international operations. This transformation led to what can be called ?the Swedish defence dismantle? and some studies mean that it has led to the point where Sweden completely lacks the ability to defence themselves.The question is if the ambition to become an active member in these security organisations can explain all the decisions made throughout the Swedish defence-transformation, or if some decisions were made due to other factors?By studying the decision process leading up to the decision to locate the flight education to Malmen in Linköping this study seeks to answer why the decision was made.
Fjärrstyrning av videokamera
On some occasions it may be inappropriate with a cameraman behind the camera. In somecases there is no cameraman available or it is a smaller event, like a family celebration, to befilmed. It can also be difficult for a cameraman to shoot from certain angles. One solution forthis kind of situations can be to remotely control the camera movements. There are thosekinds of solutions on the market today but they either address professional filmmakers or thefunctionality is limited, for example by the absence of wireless remote control.This project aims to develop a solution to the problem with absence of wireless remote controland also a solution with more flexibility and less complexity than today?s solutions.
Problem med trådlösa nätverk
Målet med detta arbete har varit att besvara frågan; ?Varför uppstår det så mycket problem med trådlösa nätverk??. Detta har gjorts genom att studera relevant litteratur för att sedan kunna utföra två egna studier: en enkätundersökning och tre experiment. Teorin har framförallt hämtats ur kurser och material från Cisco. Undersökningen har hjälpt till att fastställa den generella datoranvändarens kunskaper om trådlösa nätverk.
Möjligheternas land? En kvalitativ studie om ensamkommande barns upplevelser av att leva i Sverige
This study concerns unaccompanied refugee children and their experiences of living in Sweden and also their thoughts about identity and security. The aim of this study was to find a deeper understanding of these children?s situation. We formulated three research questions in order to obtain this deeper understanding:? What experiences do the informants have of living in Sweden?? What are the informants? views of their identity in their new life situation?? What is security to the informants?This is a qualitative study based on six semi-structured interviews with six youths whom have come to Sweden as unaccompanied refugee children.
Ser ni mer än bara min kropp? -Patienters upplevelser av trygghet under operation
ABSTRACTIntroduction: An increasing number of patients undergo surgery under local anesthesia and are thereforeawake during the procedure. Nursing care that is provided to these patients can differ from those thatreceive general anesthesia. Previous research has focused on patients? general experiences of being awakeintraoperative. But there is no research that focuses on patients perceptions of security.
Hydroakustisk kommunikation med bandspridningsteknik
This thesis investigates techniques for stealth hydroacoustic communication using spread spectrum. The Swedish naval defense organisations have a vision that all their units should be able to communicate with each other, even between underwater vehicles. But the properties of water makes it a complex channel to use for wireless communications. Radiomagnetic waves have very limited range in water, therefore acoustic waves are used. In this report the basics of wireless communication systems are described including source coding, channel coding, modulation techniques as well as different techniques for spread spectrum.
??Auktorisation och ackreditering inom Försvarsmakten : En studie i nyttan av en standardiserad process för att hantera informationssäkerhet
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Automatiskt Nödstopp
In today?s industry it is starting to get more and more interesting with wireless systems and solutions for applications. To be able to reduce the amount of cables drawn to various machines which takes both space and an extra fee for every cable drawn. Some systems might require the user to use a handheld device that is directly connected by a cable which in some machines might be inelegant for the user.The goal with this bachelor thesis is to develop wireless monitoring of the machine operators position that is working with heavy industrial machinery. The thesis started out with researching different techniques for positioning a transmitter indoors, this was done in order to get a better understanding on how to go about.