Sök:

Sökresultat:

452 Uppsatser om Secure - Sida 1 av 31

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them Secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to Secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a Secure manner.

Säkerhetsstandard för ett mjukvarubaserat säkerhetselement

Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.

Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.

Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with Secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

Vänskapshot : - en följd av ett långvarigt samarbete mellan en revisor och ett litet ägarlett bolag?

This is a bachelor essay in business and administration with concentration in accounting. The purpose of the essay is to describe and analyse how an auditor, who has had a close cooperation with a small owner-led company in several years, can obstruct the specific familiarity-threat and if it appears, Secure that it does not affect the independence of the auditor.The conclusion of this essay contains two models which intend to describe how an auditor, as a suggestion, can obstruct the specific friendship-threat and if it appears Secure the independence of the auditor..

"Halfpipe Active Channel"- developing a secure communications protocol

With the advent of powerful multimedia capable mobile phones, the market for mobile services is flourishing. Zenterio AB's Halfpipe Active Desktop is a complete distributed mobile service platform a with a powerful server and platform-independent client. The communication between the client and server takes place over a GPRS-capable mobile network. The purpose of this thesis is to develop a Secure communications protocol for use between the Halfpipe Active Desktop client and server. This is done by determining requirements, analyzing candidate protocols and then by designing the final protocol.

Institutet beslag : vid brottsutredning

The purpose of this paper is to explore what objects that can be seized and how the management of a seizure should be conducted. Ability to take enforcement against an individual should be carefully weighed against the rights and freedoms that exist. Seizure is one of the various restraints that exist, and the regulation on which they appear is mainly in the Code of Judicial Procedure, Chapter 27th. To be able to apply coercive measures, it is fundamental prerequisite that a criminal investigation is initiated, but there exist some significant exceptions to this. There are also rules about who has the right to provide for the seizure, the decision can be taken by a prosecutor, an investigator, a police officer or, in special cases, the court.

WTO - spelarena för utvecklingsländer? En studie om avgörande faktorer för utvecklingsländers förmåga att implementera sina regimpreferenser

This Bachelor Thesis is entitled "WTO-spelarena för utvecklingsländer? En studie om avgörande faktorer för utvecklingsländers förmåga att implementera sina regimpreferenser". Through our empirical results in conjunction with realist theories, this Bachelor thesis attempts to answer the questions: (1) How does the decline in American power, the nature of existing institutional structure and Third World unity, influence the ability of developing countries to Secure its preferred regimes? (2) What function do informal meetings in the WTO have? (3) How does access to informal meetings influence the ability of developing countries to Secure its preferred regimes? The paper makes use of case studies from the Ministerial meetings in the Doha development round.The conclusion is that access to these meetings is an important variable to explain the extent to which the Third World can be able to Secure its preferred regimes. The degree to which developing countries can Secure their preferred regimes is therefore a function of four variables: the nature of existing institutional structures; Third World unity, the attitude and power of the United States and foremost access to informal meetings..

Kvinnors upplevelse av planerad hemförlossning i Skandinavien : Women´s experience of planned home birth in the Scandinavian countries

Background: In Sweden and Norway planned home birth is not included in the health care system. In Denmark women with expected low risk birth have the right to choose home birth. Registrations of home births in the Nordic countries are not completed and women?s experiences of planned home birth in Scandinavian context are not earlier described.Objective: The aim of this study was to describe women?s experiences of planned home birth in the Scandinavian countries.Design: Inductive content analysis. Fifty-three Scandinavian women who have experienced planned home birth have replied an open question in a questionnaire.

En trygg bas i förskolan : En essä om två olika inskolningsmodeller ur ett anknytningsperspektiv

In our essay we examine the different introduction models that are practiced in preschool. The central question is if the different models have any importance (or consequences) for the children?s connection in preschool. In the two different cases we will present, one based upon preparatory training that was applied during the 1990s and another that is currently used today.The purpose with this essay was to get a deeper understanding for the child?s attachment to preschool and for how we, as educators should act during the preparatory training to create a Secure foundation for the child.

Anknytningens förändring och stabilitet i vuxna parrelationer: en integrerad helhetssyn

Several theoretical models of change exist concerning attachment, but an integrated view and knowledge of the role separate factors of change play for the individual is lacking. This phenomenon is hereby studied by semi-structured interviews of 20 persons. Change and factors of change are examined statistically with affectregulation as measure of attachment. The results show that these individuals´ changes are small and mostly towards Secure attachment. Metacognition is related to greater change towards Secure attachment.

Design och oro : En studie om inredning och möbeldesign och dess möjligheter att minska oro hos dementa

Between 1999 and 2009, I followed three of my grandparents, all of whom suffered from dementia. Numerous times, when I visited them in their nursing homes, I was met by residents of the ward who were very unhappy. Through conversations at home with my family, I understood more and more that this was a commonly occurring problem at nursing homes. All too often it was solved with heavy medication, which made the residents tired and they slept more often.During my undergraduate education at Konstfack, I have reflected on whether I, as an interior designer and furniture designer, can have an influence on spaces and furniture so that dementia patients can experience greater calm and security. The idea is if that I perceive the environment as calm and Secure, I will also be calm and Secure.In my degree project, I want to study how interior design and furniture design can contribute to decreased agitation in people with dementia in nursing homes..

En undersökning av framtidametoder för att säkra förband i produktion

The thesis is an examination of the methods that are appropriate and long-term choice to obtain clamping force and Secure screw joints in production. The employer, Scania CV AB, transmission manufactures axle gears to all trucks produced in Södertälje. One of the most common assembly elements is screw joints, where the clamping force is essential to achieve a Secure joint. Current methods to Secure the joint is due much of the friction effect and is an indirect method to measure the clamping force. The clampforce accuracy becomes more widely with torque angle control.

Säker grannupptäck i IPv6

The IPv6 protocol offers with some new functions, one of them is auto configuration. With auto configuration it is possible for nodes, i.e. hosts and routers, for automatically associated with IPv6 addresses without manual configuration. Auto configuration it is another protocol as it uses Neighbor Discovery protocol (ND) messages (ND is mandatory in the IPv6 stack). The main purpose of ND is that nodes can discover other nodes on the local link, perform address resolution, check that addresses are unique, and check the reachability with active nodes.There are exactly the same vulnerabilities of IPv6 as IPv4 and is now exception, ND if not properly Secured.

Säkerhetspolitik, Medborgare & Frihet

The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to Secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.

Informationsdelgivningsreglerna i MiFID II : Uppnår informationsdelgivningsreglerna behovet om ökat inesterarskydd?

The securities market was to undergo a major change with the entry of MiFID I in November 2007. EU´s establishment if the directive sets high standards for investment firms to establish internal guidelines in accordance with MiFID I. As right now, the securities market is facing further change with the proposal for MiFID II.MiFID II seeks to overcome MiFID I´s shown deficiencies. The greatest need for change are the rules that Secure investor protection, with specific focus on regulation on information service from investment firms to customers. This essay deals with the rules on information service enacted in MiFID I compared to the changes presented in MiFID II to investigate whether the changes could strengthen investor protection as desired.MiFID II is a more detailed framework than its precursor.

1 Nästa sida ->