Sök:

Sökresultat:

6476 Uppsatser om Computer science - electronic security - Sida 1 av 432

peer2peer - hur dyrt är gratis?

Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam....

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Requirement Specification for Information Security to Health Systems, Case Study - IMIS

During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

En studie av SSL

Dokumentet är ett resultat av studier gjorda under kursen Kandidatarbete I Datavetenskap. Arbetet utforskade, genom fallstudie, två egenskaper av distribuerade informationssystem och relation mellan dessa: säkerhet och prestanda. Målet med fallstudien har varit att belysa nackdelen med användning av Secure Socker Layer (SSL) dvs. dess effekt på hastigheten och fördelen med SSL, dvs. SSL:s roll i informationssäkerhetsarbetet. Arbetet visar hur prestanda i ett tillämpad distribuerat informationssystem kan påverkas av en SSL tillämpning.

Flickor och elektroniska spel: Fokusgruppintervjuer med flickor om deras syn på och användning av elektroniska spel

The aim of this Masters thesis is to examine what part and importance electronic games play in the life of girls, how the girls use electronic games and what the girls think and say about their use of electronic games. We also intend to examine what girls have to say about electronic games at the public library. Our attempt is to illuminate and bring knowledge to those who work within the library with the selection, purchase and conveyance of electronic games. Method used in the survey is focusgroup-interviews with girls in the age between 12-14 years in three different schools. The findings are related to four different perspectives, theory of child development, from a gender perspective, theories of understanding how young people use computer games and theories to understand the purpose of public libraries.

Möjligheter och begränsningar i molnet

Idag väljer många företag och kommuner att placera data i molnet istället för på en lokal server, detta medför nya problem som tidigare inte varit aktuella. Datainspektionen har påpekat brister i hur två kommuner använder molntjänster för att lagra personlig data då de ställer sig tveksamma till molnleverantörernas hantering av data samt insynen till molnleverantörerena. I detta arbete kommer det undersökas hur den svenska personuppgiftslagen fungerar när data läggs ut i en molntjänst. Resultatet av uppsatsen kommer även visa på de olika säkerhetshoten som finns i molnet och se vad säkerhetsexperter säger för att ta reda på om kommuner och företag är medvetna om och uppmärksammar samma hot. För att ta reda på detta har intervjuer genomförts med en svensk molnleverantör, företag som utvecklar tjänster mot molnet, privatpersoner som nyttjar molnet och experter inom säkerhet från Blekinge Tekniska Högskola, BTH. Resultatet av studien visar att det är svårt att se om en amerikansk leverantör uppfyller de svenska lagarna för personuppgifter, det visar också att det är teoretiskt möjligt att anlita en svensk leverantör och uppfylla lagen. Det har även visat sig att den största oron gällande molnet är bristen på kontroll av data..

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

Webbased Timereport system

Webbaserat Tidrapporteringsystem.

Studenters användning av elektroniska källor ? en användarundersökning vid Växjö universitetsbibliotek

The purpose of this master?s thesis is to gain insights into students? usage and attitudes towards electronic articles and electronic books and how students feel about a change from print collections to digital collections at Växjö University Library. The main questions are: How do different groups of students use the library collections of electronic articles and electronic books? What factors influence the usage of the library collections of electronic articles and electronic books among students? What are the students? experiences of reading electronic books in comparison with reading print books? What would different groups of students think if the literature they need for their studies were purchased in electronic form instead of print? To answer the questions a user study was carried out at Växjö university library. A web survey was sent to students that had a library card and an email address registered at the library.

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

1 Nästa sida ->