Spelling suggestions: "subject:"datorteknik"" "subject:"datortekniks""
911 |
Evaluating intrusion detection points in an end-to-end solutionPankaczi, Lilla January 2023 (has links)
Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. As both the RFID reader and tag can be located outside of secure premises, RFID communication can be a target of several cyber threats. Common cyber-attacks such as replay attacks, eavesdropping, or tag cloning can be associated with the lack of security of the communication channel between the reader and the tag or flaws of the implemented authentication protocols and encryption algorithms. This thesis briefly summarizes parts 4 and 3 of the ISO/IEC 14443 standard, which specify the initialization, selection, and transmission protocols in high-frequency RFID smart-card and reader communication. A formal security analysis was conducted to evaluate these protocols using a tool called Scyther. Then, an improved authentication protocol was proposed utilizing a commercially available feature, the Random Unique Identifier of the card (RID). The Scyther protocol verification results showed that implementing RID can prevent many RFID attacks such as, eavesdropping or replay attacks, and protect the cardholder's privacy.
|
912 |
Kubernetes Automatic Geographical Failover TechniquesEriksson, Philip January 2023 (has links)
With the rise of microservice architectures, there is a need for an orchestration tool to manage containers. Kubernetes has emerged as one of the most popular alternatives, adopting widespread usage. But managing multiple Kubernetes clusters on its own have proven to be a challenging task. This difficulty has given rise to multiple cloud based alternatives which help streamline the managing process of a cluster environment and helps maintain an extreme high availability environment that is hard to replicate in an on premise environment. Using these cloud based platforms for hosting and managing ones system is great, but alleviating control of a system to a cloud provider masquerades any illicit behaviour performed on or through the system. The scope of this thesis is on examining optional designs that will automate the process of executing a geographical failover between different locations to better sustain an on premise fault tolerant kubernetes environment. There already exists multiple tools in the area of kubernetes service mesh, but their focus is not primarily on increasing system resilience but to increase security, observability and performance. Linkerd is a sidecar oriented service mesh which supports geographical failover by manually announcing individual services between cluster(s) mirror gateways. Cilium offers an Container Networking Interface (CNI) which performs routing through eBPF and allows for seamless failover between clusters by managing cross cluster service endpoints. Both of the mentioned service mesh providers handle failover from inside the kubernetes cluster. The contributions includes two new peer-to-peer designs that focus on external cluster geographical failover - both designs are compatible with preexisting kubernetes clusters without internal modifications. A fully repli-cated design was then realised into a proof of concept (POC), and tested against a Cilium multi cluster environment on the metric of north to south traffic latency. Due to the nature of the underlying hardware, the tests showed that the POC can be used for external geographical failover and it showed potential performance capabilities in a limited lab scale. As the purpose of this thesis was not to determine the traffic throughput of a geographical failover solution; but to examine different approaches automatic geographical failover can be implemented, the tests were a success. Therefore, this thesis can conclude that there exists several working solutions, and the POC have shown that there are still undiscovered and unimplemented solutions to explore.
|
913 |
Scrum Team Adoption of DevOps : Exploring the interfaces and the challengesPelmas, Daniel, Lejon, Lasse January 2023 (has links)
Scrum is a widely used methodology for software development that is born of the Agile movement. In recent years DevOps has been increasing in popularity within the software industry. The purpose of this thesis is to firstly, explore the technical and social challenges a Scrum team may face when adopting DevOps. Secondly, to explore what collaboration mechanisms that can facilitate a closer cooperation between development and operations. A multiple case study was conducted using semi-structured interviews as the data collection method. The interviews were transcribed and analyzed using thematic analysis. Three technical challenges and one social challenge emerged from the analysis. Additionally, four mechanisms were identified during the analysis as ways to achieve a closer collaboration between the development and operations teams. The result discussion showed that challenges of adopting DevOps when using Scrum are comparable to the findings of previous research where the scope of methodology is not limited to Scrum. Furthermore, the identified collaboration mechanisms can be used by organizations to enhance collaboration between development and operations but should not be seen as strict guidelines.
|
914 |
Investigating the usefulness of a generative AI when designing user interfacesBleichner, Andreas, Hermansson, Nils January 2023 (has links)
Generative AI is a hot topic as of 2023, with huge financial investments in the industry. The areas of use for it are rapidly expanding. One potential benefit of generative AI could be in the field of UX design.For this master's thesis, a Stable Diffusion model has been fine-tuned to create pictures of login screens based on text prompts written by a user. A set of these pictures have been used in a prototype and the concept has been evaluated through user tests. The prototype and the concept of using generative AI in UX design received a positive reception from testers. It was established that further work on the fine-tuned model and how to use it as a tool is required for it to be effectively integrated into the design process of user interfaces.
|
915 |
Utvecklingen av ett visselblåsarsystem : Ett system skapat efter lagen om skydd för personer som rapporterar om missförhållandenBäcklin, Lisa January 2023 (has links)
On December 7, 2021, a new law came into effect - the Whistleblower Protection Act. According to this law, individuals should be able to anonymously report misconduct in the workplace. The aim of this project was to create a "whistleblower system" based on this law, enabling employees to easily report workplace misconduct - completely anonymously. In this report I will outline everything that has been done to achieve the final outcome - from initial work on prototypes and design sketches to the final result, including analysis and discussion. / Den 7 december 2021 så trädde en ny lag i kraft – visselblåsarlagen. Enligt den lagen så ska man helt anonymt kunna larma om missförhållanden på arbetsplatsen. Målet med detta projekt var att skapa ett så kallat ”visselblåsarsystem” som utgår efter denna lag, så att anställda enkelt kan rapportera in missförhållanden på arbetsplatsen – helt anonymt. I denna rapport så kommer jag att gå igenom allt som gjorts för att uppnå slutresultatet – allt från förarbete med prototyper och designskisser, till slutresultat med analys och diskussion.
|
916 |
Väderdata : Interaktiv visualisering av väderdataLindholm, Hanna January 2023 (has links)
The goal of this work has been to create an interactive visualization of weather data for the company Biometria. The weather data has been collected over a period of 2 years using a measuring device placed in a forest cabin. The forest cabin has been moved to different logging sites, and continuously sent measurement results. To understand the structure and organization of the data that would be visualized, a preliminary study and review have been conducted. Furthermore, a plan for the setup and a preliminary design of a prototype have been created. The preliminary work has formed the basis for the website developed using the ASP .NET Core framework. A login system has been developed using ASP .NET Core Identity and implemented on the website. The interactivity and visualization have been constructed by generating markers on a map when selecting a range between two dates. When clicking on a marker, a box with information such as date, temperature, and humidity is displayed. The position of the marker and its associated information are retrieved through calls to an external Application Programming Interface (API). The markers are displayed in different colors depending on the measured temperature. The construction has been developed in the Visual Studio development environment. / Målet med detta arbete har varit att skapa en interaktiv visualisering av väderdata åt företaget Biometria. Väderdata har samlats in under 2 års tid via en mätenhet som suttit på en skogskoja. Skogskojan har flyttats runt till olika avverkningsplatser och kontinuerligt skickat mätresultat. För att få förståelse om uppbyggnaden och strukturen av det data som skulle visualiseras, har en förstudie och granskning utförts. Vidare har en planering av upplägget och ett förarbete med formgivning av en prototyp skapats. Förarbetet har legat till grund för den webbplats som utvecklats med ramverket ASP .NET Core. Ett inloggningssystem har tagits fram med hjälp utav ASP .NET Core Identity och implementerats i webbplatsen. Interaktiviteten och visualiseringen har konstruerats genom att det vid val av ett spann mellan två datum, genereras markeringar på en karta. Vid klick på markeringen visas en ruta med information datum, temperatur och luftfuktighet. Positionen för markeringen och tillhörande information hämtas via anrop till ett externt API (Application Programming Interface). Markeringarna visas med olika färger beroende på mätenhetens uppmätta temperatur. Konstruktionen har tagits fram i utvecklingsmiljön Visual Studio.
|
917 |
Design och implementation av en e-butik med en personifierbar produkt för att uppnå nytta och effektivitet : Utveckling av e-butiken Coffe CreationÖhlund, Elinor, Wang, William, Phung, Gullis, Olsson, Jonas, Lundqvist, Felix, Hultberg, Dag, Fixcher, Max, Back, Hampus January 2017 (has links)
Syftet med den här studien är att finna faktorer som gör en e-butik med personifierbara produkter användbar i form av effektivitet och nytta. Processen fram till slutprodukten har gjorts med en iterationsbaserad user-centered design-metod där utvecklarna under arbetets gång har haft en kontinuerlig dialog med slutanvändaren. Designmässiga val har gjorts utifrån återkoppling från användartester vilket har resulterat i en slutsats om att det finns fem faktorer som är viktiga att ha i åtanke då en e-butik för personifierbara produkter ska utvecklas. Att applikationens syfte och funktion presenteras för användaren visade sig vara viktigt för såväl nytta som effektivitet. Användarens förståelse om hur ett val som tas i applikationen kommer att påverka produkten är kopplat till nytta, och applikationens återkoppling kring ett val som har gjorts är kopplat till effektivitet. En väl utarbetad hierarki för det flöde användaren går igenom vid anpassning av en personifierad produkt är en kritisk faktor för effektivitet. Den sista faktorn är relaterad till ett begrepp som har benämnts alternativa köpflöden. Detta handlar främst om att det kan finnas en användarnytta med att utgå från förinställda produkter vid anpassning, istället för att skapa en ny produkt från grunden. / The purpose of this study is to find factors that enhances the usability of an e-commerce with customizable products in terms of usefulness and effectiveness/efficiency. The process which has been used to reach the end product is an iteration-based user-centered design method in which the developers have had a continuous dialogue with the end users. The design choices that have been made are based on user test feedback. Five factors of importance to achieve usefulness and effectiveness/efficiency for an e-commerce website that sell customizable products have emerged from the study. It has been shown that both usefulness and effectiveness/efficiency are affected by the presented functionality and purpose of the application. The users understanding of how a certain choice will affect a customizable product is connected with usefulness. The applications capability to inform the user of the information found on the e-shop need to have a proper structure to achieve effectiveness/efficiency. The last factor is related to the buying process, it is shown that the usefulness can be improved if there is a possibility to select products without the need to create a custom product from scratch.
|
918 |
Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of ViewBull, Victoria January 2023 (has links)
The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. This project explores howan intrusion detection system called DETONAR can be used on border router logs, instead of itsoriginal use of sniffer devices. Using DETONAR in this way allows us to detect many differentattacks, without contributing to the additional cost of deploying sniffer devices and the additionalrisk of the sniffer devices themselves becoming the target of attack
|
919 |
Information Visualization of Performance Indicators for Drones in Urban Areas : A Complementary Module for the Visual Research Tool UTM50Kettisen, Anders January 2022 (has links)
Drones in low-altitude air space at a large scale is a new and ongoing field of research and there is a high possibility that we during the coming decades will see a rise in both commercial and state-driven drone activities in this space, especially in urban areas. This will require new ways in which to think and operate all air traffic management around the world. To support the research and realization of this, this master thesis will investigate a way to visualize performance indicators for drones that are related to key performance indicators used in air traffic today. This is done by researching commonly used performance metrics for air traffic and finding a suitable program that can visualize these in different graph types often used in information visualization, to build and evaluate an interactive dashboard that lets a user explore the performance data. The drone data used in this work is retrieved from a drone simulation program where delivery drones act between start, delivery and endpoints. / <p>Examensarbetet är utfört vid Institutionen för teknik och naturvetenskap (ITN) vid Tekniska fakulteten, Linköpings universitet</p>
|
920 |
Nätverk och felsökning : Utbildningsmaterial och presentation av felsökningsverktygEriksson, Morgan January 2022 (has links)
Målet med detta arbete är tvåfaldigt, först att producera utbildningsmaterial inom nätverk och felsökning och sedan presentera ett antal felsökningsverktyg för användning vid både utbildning och daglig drift. I nuläget så har företaget en rudimentär utbildning som avser hjälpa ny personal att snabbare komma i fas med supportarbetet men den saknar delar som företaget nu önskar åtgärda. Ambitionen är att med en ny uppdaterad och mer strukturerad utbildning där extra fokus läggs på felsökning kommer ge resultat på längre sikt och i slutändan vara positivt för företaget.
|
Page generated in 0.0301 seconds