Sökresultat:
6476 Uppsatser om Computer science - electronic security - Sida 1 av 432
peer2peer - hur dyrt är gratis?
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas
med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas
spyware alternativt adware, misstänks för att samla in personlig information,
så som e-mailadresser och lösenord. Det föreligger en risk att informationen
sedan säljs vidare eller används för att exempelvis rikta reklam....
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Requirement Specification for Information Security to Health Systems, Case Study - IMIS
During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was
developed at BTH (Blekinge University of Technology) to demonstrate how mobile
IT-systems can be used in healthcare. The prototype was based on the activity
theory of Engeström.
An ongoing project started in spring 2003. The purpose of the project is
further development of IMIS with special focus in the diabetes healthcare.
Participants in the project are scientists and students at BTH, ALMI
Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge
Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Säkerhet och integritet i närfältskommunikation
Context. In today?s society we use smart cards in many areas, NFC is a smart
card technology that allows contactless interaction between a reader and the
tag, the tag is often in the form of a card. NFC can be used for various
payment methods or as access card to a building which makes life easier. In
previous studies, the technique has proven to be weak to attacks using an NFC
reader connected to a computer.
Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare
This bachelor thesis looks at developers knowledge about web security both
regarding their own view on their knowledge and their actual knowledge about
vulnerabilities and how you mitigate against them. Web developers knowledge
regarding web security are becoming more and more important as more
applications and services moves to the web and more and more items become
connected to the internet. We are doing this by conducting a survey among
developers that are currently studying in the field or are working in the field
to get a grip on how the knowledge is regarding the most common security
concepts. What we saw was that the result varies between the different concepts
and many lack much of the knowledge in web security that is getting
increasingly more important to have..
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
En studie av SSL
Dokumentet är ett resultat av studier gjorda under kursen Kandidatarbete I
Datavetenskap. Arbetet utforskade, genom fallstudie, två egenskaper av
distribuerade informationssystem och relation mellan dessa: säkerhet och
prestanda. Målet med fallstudien har varit att belysa nackdelen med användning
av Secure Socker Layer (SSL) dvs. dess effekt på hastigheten och fördelen med
SSL, dvs. SSL:s roll i informationssäkerhetsarbetet.
Arbetet visar hur prestanda i ett tillämpad distribuerat informationssystem kan
påverkas av en SSL tillämpning.
Flickor och elektroniska spel: Fokusgruppintervjuer med flickor om deras syn på och användning av elektroniska spel
The aim of this Masters thesis is to examine what part and importance electronic games play in the life of girls, how the girls use electronic games and what the girls think and say about their use of electronic games. We also intend to examine what girls have to say about electronic games at the public library. Our attempt is to illuminate and bring knowledge to those who work within the library with the selection, purchase and conveyance of electronic games. Method used in the survey is focusgroup-interviews with girls in the age between 12-14 years in three different schools. The findings are related to four different perspectives, theory of child development, from a gender perspective, theories of understanding how young people use computer games and theories to understand the purpose of public libraries.
Möjligheter och begränsningar i molnet
Idag väljer många företag och kommuner att placera data i molnet istället för
på en lokal server, detta medför nya problem som tidigare inte varit aktuella.
Datainspektionen har påpekat brister i hur två kommuner använder molntjänster
för att lagra personlig data då de ställer sig tveksamma till
molnleverantörernas hantering av data samt insynen till molnleverantörerena.
I detta arbete kommer det undersökas hur den svenska personuppgiftslagen
fungerar när data läggs ut i en molntjänst. Resultatet av uppsatsen kommer även
visa på de olika säkerhetshoten som finns i molnet och se vad säkerhetsexperter
säger för att ta reda på om kommuner och företag är medvetna om och
uppmärksammar samma hot. För att ta reda på detta har intervjuer genomförts med
en svensk molnleverantör, företag som utvecklar tjänster mot molnet,
privatpersoner som nyttjar molnet och experter inom säkerhet från Blekinge
Tekniska Högskola, BTH.
Resultatet av studien visar att det är svårt att se om en amerikansk leverantör
uppfyller de svenska lagarna för personuppgifter, det visar också att det är
teoretiskt möjligt att anlita en svensk leverantör och uppfylla lagen. Det har
även visat sig att den största oron gällande molnet är bristen på kontroll av
data..
Är handdatorer säkra nog för hälso- och sjukvården?
The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.
Webbased Timereport system
Webbaserat Tidrapporteringsystem.
Studenters användning av elektroniska källor ? en användarundersökning vid Växjö universitetsbibliotek
The purpose of this master?s thesis is to gain insights into students? usage and attitudes towards electronic articles and electronic books and how students feel about a change from print collections to digital collections at Växjö University Library. The main questions are: How do different groups of students use the library collections of electronic articles and electronic books? What factors influence the usage of the library collections of electronic articles and electronic books among students? What are the students? experiences of reading electronic books in comparison with reading print books? What would different groups of students think if the literature they need for their studies were purchased in electronic form instead of print? To answer the questions a user study was carried out at Växjö university library. A web survey was sent to students that had a library card and an email address registered at the library.
Säkra kommunikationskanaler i en distribuerad heterogen miljö
The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.