Sökresultat:
13 Uppsatser om Vulnerabilities - Sida 1 av 1
Vikten av säkra nätverk
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk Vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify Vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.
Vatten- och avloppssystem i klimatförändringarnas tidevarv : - en studie om VA-situationen i Karlstads kommun, dess sårbarheter och anpassningsförmåga
This report is about the impact climate change has on the water and sewage systems in general, and the situation in the municipality of Karlstad in particular. Which Vulnerabilities are linked to water and sewage systems with regard to climate change and extreme weather situations, what are the possibilities to adapt the system to this and what significance does climate adaptation of the water and sewage systems have in relation to sustainable development?To answer these questions I have studied literature on the subject and interviewed several people who work with these types of questions. The answers I have received state that there are a multitude of Vulnerabilities linked to the water- and sewage systems, but that there are also many strong interests which strive to take measures and adapt to a changed climate. I have also come to the conclusion that the starting points and views of the possibilities to act differs between the people that I have interviewed, but that theses problems are built into the concept of democracy..
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to Vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Webbsäkerhet och vanliga brister : kunskapsläget bland utvecklare
This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about Vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..
Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare
This bachelor thesis looks at developers knowledge about web security both
regarding their own view on their knowledge and their actual knowledge about
Vulnerabilities and how you mitigate against them. Web developers knowledge
regarding web security are becoming more and more important as more
applications and services moves to the web and more and more items become
connected to the internet. We are doing this by conducting a survey among
developers that are currently studying in the field or are working in the field
to get a grip on how the knowledge is regarding the most common security
concepts. What we saw was that the result varies between the different concepts
and many lack much of the knowledge in web security that is getting
increasingly more important to have..
Eudaimonia! : Martha Nussbaums aristoteliska försvar för en reformering av högre utbildning
This essay aims to examine Martha Nussbaum's proposal for a classical defense of reform in liberal education and her critique of utility thinking in higher education. I want to explore how Nussbaum uses history to create an ethical alternative that cultivates both moral and intellectual virtues, which she considers to be crucial for the survival of democracy. In examining Nussbaum's use of Aristotle, I focus on her work as a proposal for institutional implementation of an Aristotelian epistemology and the cultivation of the individual as an ethical political subject. This study highlights the epistemological, educational and political ideas that form the basis of Nussbaum's ideals. I intend, however, to go beyond a contextualizing reading and thus establish a dialogue with a radical intersubjectivity to respond to Nussbaum's ambitions to recognize human Vulnerabilities as assets for reason.
Säker grannupptäck i IPv6
The IPv6 protocol offers with some new functions, one of them is auto configuration. With auto configuration it is possible for nodes, i.e. hosts and routers, for automatically associated with IPv6 addresses without manual configuration. Auto configuration it is another protocol as it uses Neighbor Discovery protocol (ND) messages (ND is mandatory in the IPv6 stack). The main purpose of ND is that nodes can discover other nodes on the local link, perform address resolution, check that addresses are unique, and check the reachability with active nodes.There are exactly the same Vulnerabilities of IPv6 as IPv4 and is now exception, ND if not properly secured.
Hotbilden i Sverige : En undersökning av den digitala hotbilden mot ett medelstort svenskt företag
Internet and information technology today has a rather obvious role in the activities of companies and organizations. All cash transactions within and between companies is digitized, communication within the company is done via e-mail, sales and marketing is done largely with marketing and ads on the Internet. This has resulted in economic benefits for companies and organizations, and facilitated the work for them. However, this has also led to new threats have emerged. Companies and organizations is well aware that there are numerous threats that comes with using the Internet and Information Technologies but exactly what those threats are for a mid-sized company in Sweden is not clarified anywhere.
Logistiska flaskhalsar vid en expeditionär operation
Försvarsmaktens förändring genom reformarbetet mot ett insatt insatsförsvar, har lett till ett fokus mot delvis nya uppgifter. Expeditionära operationer är en sådan uppgift, som innebär förändrade krav och förmågor på materiel och personal. Problemet, som uppsatsen vill belysa, är att vid planering och genomförande är taktiska uppgifter i operationsområdet dimensionerande i för hög grad. På det viset läggs inte tillräcklig kraft på hur förbandet ska komma på plats och hur bäst förutsättningar för uthållighet ska säkerställas över tiden. Det är därför angeläget att en noggrann analys genomförs i planläggningsskedet, så att egna kritiska sårbarheter kan identifieras.Syftet med uppsatsen är att undersöka vilka kritiska sårbarheter som är tydligast ur ett logistiskt perspektiv, vid en vald expeditionär operation.
Graybox-baserade säkerhetstest : Att kostnadseffektivt simulera illasinnade angrepp
Att genomföra ett penetrationstest av en nätverksarkitektur är komplicerat, riskfyllt och omfattande. Denna rapport utforskar hur en konsult bäst genomför ett internt penetrationstest tidseffektivt, utan att utelämna viktiga delar. I ett internt penetrationstest får konsulten ofta ta del av systemdokumentation för att skaffa sig en bild av nätverksarkitekturen, på så sätt elimineras den tid det tar att kartlägga hela nätverket manuellt. Detta medför även att eventuella anomalier i systemdokumentationen kan identifieras. Kommunikation med driftansvariga under testets gång minskar risken för missförstånd och systemkrascher.
J?mst?lldhetsperspektiv inom det svenska klimatanpassningsarbetet: En kvalitativ inneh?llsanalys av offentliga myndigheters handlingsplaner f?r klimatanpassning
The climate crisis represents a serious threat to both people and nature and it will exacerbate existing inequalities, especially for women and girls who are most at risk yet have contributed least to the problem. Climate adaptation is critical to addressing the challenges of climate change, and it requires integrating a gender perspective to take into account the specific Vulnerabilities faced by women and girls, as highlighted in the Paris Agreement. This study examines the implementation of gender perspectives in Swedish governmental climate change adaptation strategies. By applying a qualitative content analysis to 24 government agencies? action plans, the study investigates how gender equality is addressed in the context of climate change adaptation.
Portabla enheter : Hot, risker, sårbarheter, lösningar och skyddande motåtgärder
Detta examensarbete har utförts på uppdrag av Försvarsmakten. Arbetets målsättning är att undersöka hot, risker och sårbarheter som portabla enheter kan orsaka eller bidra till inom en organisation. Bärbara datorer med operativsystemet Windows och Mac, samt surfplattor och smartphones med operativsystemet Android, iOS och Windows Phone är de portabla enheter som är utvalda att ingå i denna rapport. Vidare diskuteras förslag på hur man kan förebygga olika säkerhetsrisker. Rapporten tar även upp dagens BYOD-lösningar (Bring Your Own Device).
Strömmar av vatten och politik - en studie om policyprocesser och anpassning.
One of the distinguishing features of successful societies is the ability to adapt to change, bothsocial but also natural changes like climate change. Climate change is a complex, dynamic,non-linear process with a great deal of uncertainty concerning the time perspective, risks andconsequences. A combination of factors like climate change, geographical vulnerability, adensely populated and highly built up coast line along with factors like deficient handling ofsurface runoff and a large usage of ground water leads to an increasingly vulnerable society. Italso puts a greater pressure on the society to have preventive measures in place.The number of actors working with preparing society to the expected impacts of climatechange and variability is increasing. However more than half of Sweden?s municipalities donot consider changing climatic conditions when planning, and many times even allow theconstruction of new living areas in known climatically vulnerable areas.