• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 2
  • 2
  • 2
  • Tagged with
  • 17
  • 17
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

As práticas do educador social na política pública da assistência social: tensionamentos sobre um campo em dispersão

Rubini, Leila Ribeiro January 2015 (has links)
O presente estudo compreende uma pesquisa-intervenção realizada junto a educadores sociais que trabalham em serviços socioeducativos nos CRAS do município de São Jose dos Pinhais-PR. Partindo da constatação de que se trata de uma profissão atualmente em debate, em amplo crescimento, cuja atuação vem sendo discutida por diferentes posicionamentos teóricos, nos propusemos a analisar suas práticas, tomando como problema de pesquisa a pergunta: como se configuram as práticas do educador social nos Serviços de Convivência e Fortalecimento de Vínculos? Partindo do conceito operador práticas, nos lançamos em uma pesquisa-intervenção com a proposição de criação de espaços coletivos de análise para problematização das práticas do educador social. Nossa pesquisa se constituiu em dois planos analíticos constituídos inicialmente por uma análise de documentos, procurando responder questões históricas da emergência das práticas socioeducativas, articulando entradas no campo do trabalho social e da educação em sua emergência histórica, bem como a constituição de práticas dirigidas a crianças e adolescentes pobres – concebidos como “abandonados”, “delinquentes”, “em situação de vulnerabilidade ou risco social” – no Brasil, ao longo do século XX e início do século XXI, tendo Foucault como referência para uma análise discursiva; posteriormente por uma análise produzida a partir de encontros com educadores sociais, na perspectiva da pesquisa-intervenção, com base nos referencias teórico-metodológicos da Análise Institucional. Estes dois planos sustentaram um terceiro momento analítico em que colocamos em relação enunciados mapeados nos documentos e os analisadores construídos nos encontros com os educadores sociais. Evidenciaram-se traçados de estratégias de segurança, em seu caráter de regulação das populações e dos corpos. A estratégia de segurança que sustenta tanto uma convivência segura quanto um convívio seguro, parece operar uma estratégia de educação moral, através do aconselhamento, assim como produzir uma proteção vigilante, na medida em que a escuta além de acolhimento é também um espaço de confissão. A escuta apareceu como função não-formalizada do educador social, fazendo operar um mecanismo vigilante protetivo, que integra as intervenções nos serviços de convivência às intervenções da equipe técnica com as famílias acompanhadas na proteção social básica. O analisador coringa nos pareceu potente para a problematização e desnaturalização das práticas do educador social, na medida em que evidenciou tensões referentes à flexibilização de sua função, ao campo de saber – ou campos de saberes – em que se insere, e aos objetos alvo de sua intervenção. A proposta da pesquisa-intervenção e o conceito operador práticas nos remetem ao conceito de transversalidade, à busca de ampliação e abertura do coeficiente comunicacional, e produção de novos modos de ser e de pensar. Nesse sentido, o exercício constituído nessa pesquisa buscou operar deslocamentos, abalar evidências, problematizar práticas, visando não sua prescrição, mas a ampliação das análises, num exercício de luta e resistência conjunta em relação ao estado de coisas de um campo de práticas do educador social na assistência social. / This research is an intervention-research conducted with social educators working in social education activities on social assistance public policy in the city of São José dos Pinhais-PR. Social educator is a profession currently under discussion, in extensive growth and which performance has been discussed by different theoretical positions. The goal was to examine its practices, building the research problem: how are composed the social educators practices in prevention services for children on the social assistance public policy? Based on Foucault’s operator concept practices, in this intervention-research it was proposed the creation of collective analysis spaces for the problematization of social educators practices. The research is composed by two analytical plans. The first is a documental analysis, addressing historical issues of the emergence of socio-educational practices, linking entries in the field of social work and education in its historical emergence. It was also evaluated the establishment of practices that are focused at poor children and adolescents – so called as "abandoned", "criminals", "in social risk or social vulnerability"-in Brazil throughout the 20th century and early 21st century, using Foucault's concepts as a reference for a discourse analysis. The second analytical plan was based on the analysis from meetings with social educators, in the intervention-research perspective, based on Institutional analysis's methodological references. These two plans created a third analytical moment in which they were linked. As research results it was evidenced security strategies features, in its character of regulation of the population and of the bodies. A security strategy that seems to place both safe acquaintanceship and safe coexistence interaction, it also seems to operate a moral education strategy through the counseling, as well as produce a protective surveillance. In this strategy, the listening produces both refuge and confession. The listening appeared as non-formalized role of the social educators, creating a surveillance protective mechanism that integrates the interventions with families accompanied in social protection by technical staff. The word Joker seems to be a good analyser of social educators practices, for both problematization and denaturalization. It has highlighted tensions related to the flexibility of its function, its field of knowledge, and its target public. The intervention-research proposal and the operator concept of practices refer to transversality, as well as opening the communication coefficient, and the production of new ways of being and thinking. In this sense, the exercise proposed in this research sought to operate displacements, a problematization of practices and shatter evidences. Not seeking their prescription, but the extension of the analysis.
12

Σχεδίαση και υλοποίηση μηχανισμών ασφάλειας για διάχυτες υπηρεσίες υγείας πάνω σε δίκτυα επόμενης γενιάς

Μαντάς, Γεώργιος 01 October 2012 (has links)
Στην παρούσα διατριβή προτείνονται Μηχανισμοί Ασφάλειας για την ανάπτυξη ασφαλών και αξιόπιστων διάχυτων υπηρεσιών υγείας πάνω σε Δίκτυα Επόμενης Γενιάς (Next Generation Networks – NGN). Οι προτεινόμενοι Μηχανισμοί Ασφάλειας έχουν ως στόχο να λειτουργήσουν προσθετικά στο επίπεδο ασφάλειας που προσφέρουν οι υπάρχοντες μηχανισμοί ασφάλειας που υποστηρίζονται από το NGN. Αυτό είναι αναγκαίο καθώς οι διάχυτες υπηρεσίες υγείας εμπεριέχουν ιδιαιτέρως ευαίσθητη πληροφορία. Επιπρόσθετα, στην παρούσα διατριβή προτείνεται ένα γενικό πλαίσιο εφαρμογής, το οποίο υποστηρίζει τους προτεινόμενους Μηχανισμούς Ασφάλειας, προκειμένου να επιτυγχάνεται γρήγορη και αποτελεσματική ανάπτυξη ασφαλών και αξιόπιστων διάχυτων υπηρεσιών υγείας πάνω σε NGN. Πιο συγκεκριμένα, το προτεινόμενο πλαίσιο βασίζεται στην αρχιτεκτονική του προτύπου ETSI/Parlay και επεκτείνει το σύνολο των Διεπαφών των Χαρακτηριστικών Ικανότητας Υπηρεσίας (Service Capability Features Interfaces – SCFs Interfaces) και το σύνολο των μηχανισμών που υποστηρίζει το Πλαίσιο ETSI/Parlay. Το προτεινόμενο πλαίσιο επεκτείνει το σύνολο των Διεπαφών των Χαρακτηριστικών Ικανότητας Υπηρεσίας προκειμένου αυτό να περιλαμβάνει όχι μόνο τις διεπαφές που σχετίζονται με τις υπηρεσίες του υποκείμενου δικτύου (NGN), αλλά και επιπλέον διεπαφές που δίνουν τη δυνατότητα σε διάχυτες υπηρεσίες υγείας να έχουν πρόσβαση σε ικανότητες επαίσθησης (sensing capabilities) δικτύων αισθητήρων που είναι υπεύθυνα για τη συλλογή πληροφορίας περιβάλλοντος καθώς και βιοπληροφορίας. Επίσης, το προτεινόμενο πλαίσιο επεκτείνει το σύνολο των μηχανισμών που υποστηρίζει το Πλαίσιο ETSI/Parlay προκειμένου να είναι δυνατή η παροχή σε διάχυτες υπηρεσίες υγείας όχι μόνο των βασικών μηχανισμών, που υποστηρίζονται από το προτυποποιημένο Πλαίσιο ETSI/Parlay, αλλά και των Μηχανισμών Δικτύων Αισθητήρων καθώς και των Μηχανισμών Ασφάλειας, οι οποίοι προτείνονται στην παρούσα διατριβή. Οι Μηχανισμοί Ασφάλειας, οι οποίοι προτείνονται, στοχεύουν στην παροχή ασφάλειας στα δεδομένα των τελικών χρηστών καθώς και στην ασφαλή πρόσβαση στις διάχυτες υπηρεσίες υγείας και στην ασφαλή χρήση τους. Πιο συγκεκριμένα, οι προτεινόμενοι Μηχανισμοί Ασφάλειας επικεντρώνονται στη διασφάλιση της εμπιστευτικότητας των δεδομένων, της ακεραιότητας των δεδομένων, της πιστοποίησης αυθεντικότητας καθώς και του ελέγχου πρόσβασης των οντοτήτων που συμμετέχουν σε διάχυτες υπηρεσίες υγείας. Για τη διασφάλιση της εμπιστευτικότητας των δεδομένων προτείνεται ένα γενικό σχήμα κρυπτογράφησης. Αυτό το σχήμα επιτρέπει το σχεδιασμό και την υλοποίηση ασφαλών εξατομικευμένων κρυπτογραφικών αλγορίθμων τμήματος για την κρυπτογράφηση δεδομένων διάχυτων υπηρεσιών υγείας, όπως οι ιατρικοί φάκελοι των ασθενών. Επίσης, προτείνεται ένας μηχανισμός για διασφάλιση της ακεραιότητας των δεδομένων για σύστημα ιατρικής τηλε-παρακολούθησης. Αυτό το σύστημα τηλε-παρακολούθησης λειτουργεί σε περιβάλλον έξυπνου σπιτιού και υποστηρίζει τη μεταφορά βιοσημάτων του ασθενή από τον ασθενή στη Μονάδα Παροχής Υπηρεσιών Υγείας. Επιπρόσθετα, προτείνονται δύο μηχανισμοί για διασφάλιση της πιστοποίησης αυθεντικότητας. Ο πρώτος μηχανισμός είναι ένας ευφυής μηχανισμός πιστοποίησης αυθεντικότητας για εφαρμογές e-Hospital πάνω σε WLAN μέσα σε νοσοκομείο. Ο δεύτερος μηχανισμός είναι ένας μηχανισμός συμφωνίας κλειδιού ομάδας και ανάκτησης σε ad hoc δίκτυα, που χρησιμοποιούνται κατά τη διαχείριση ιατρικών συμβάντων έκτακτης ανάγκης σε περιοχές στις οποίες δεν υπάρχει σταθερή τηλεπικοινωνιακή υποδομή. Τέλος, προτείνεται μία υποδομή PKI σε ένα ιατρικό δίκτυο μεγάλης κλίμακας που συνδέει ένα ευρύ φάσμα από Μονάδες Παροχής Υπηρεσιών Υγείας. Η προτεινόμενη υποδομή PKI εστιάζεται στη διασφάλιση της πιστοποίησης αυθεντικότητας και του ελέγχου πρόσβασης των επαγγελματιών του χώρου της υγείας που επιθυμούν να αποκτήσουν πρόσβαση σε υπηρεσίες που σχετίζονται με αυτούς καθώς και σε υπηρεσίες υγείας που σχετίζονται με τον ασθενή. / In this dissertation, Security Mechanisms are proposed for the development of secure and reliable pervasive healthcare services over Next Generation Networks (NGN). The proposed Security Mechanisms aim at increasing the security level provided by the existing security mechanisms supported by NGN. It is essential since pervasive healthcare services include extremely sensitive information. Furthermore, in this dissertation, a generic application framework is proposed supporting the proposed Security Mechanisms in order the rapid and efficient development of secure and reliable pervasive healthcare services over NGN to be achieved. In particular, the proposed framework is based on the ETSI/Parlay architecture and extends the set of the Service Capability Features Interfaces (SCFs Interfaces) as well as the set of mechanisms supported by the ETSI/Parlay Framework. The proposed framework extends the set of the SCFs Interfaces in order to integrate not only the interfaces related to the services of the underlying network (NGN), but also additional interfaces enabling pervasive healthcare services to access sensing capabilities of sensor networks which are responsible for gathering context and bio information. Moreover, the proposed framework extends the set of mechanisms supported by the ETSI/Parlay Framework to provide pervasive healthcare services not only with the basic mechanisms supported by the standardized ETSI/Parlay Framework, but also with the Sensor Networks Mechanisms and the Security Mechanisms proposed in this dissertation. The proposed Security Mechanisms aim at securing the end-user data as well as the access to the pervasive healthcare services and the use of them. In particular, the proposed Security Mechanisms focus on ensuring data confidentiality, data integrity, authentication and access control of entities participating in pervasive healthcare services. To ensure data confidentiality, a generic encryption schema is proposed. This schema enables the design and implementation of secure personalized block ciphers for encryption of data included in pervasive healthcare services such as patients’ medical records. Moreover, a data integrity mechanism for a tele-monitoring system is proposed. This tele-monitoring system operates in a smart home environment and supports transmission of patient’s biosignals from the patient to the Healthcare Center. Additionally, two authentication mechanisms are proposed. The first mechanism is an intelligent authentication mechanism for e-Hospital applications over WLAN in a hospital. The second mechanism is a group key agreement and recovery mechanism in ad hoc networks used for handling emergency medical incidents in areas without fixed telecommunications infrastructure. Finally, a PKI infrastructure in a large-scale healthcare network connecting a wide spectrum of Healthcare Centers is proposed. The proposed PKI infrastructure focuses on ensuring authentication and access control of healthcare professionals willing to access services related to them as well as healthcare services related to patient.
13

As práticas do educador social na política pública da assistência social: tensionamentos sobre um campo em dispersão

Rubini, Leila Ribeiro January 2015 (has links)
O presente estudo compreende uma pesquisa-intervenção realizada junto a educadores sociais que trabalham em serviços socioeducativos nos CRAS do município de São Jose dos Pinhais-PR. Partindo da constatação de que se trata de uma profissão atualmente em debate, em amplo crescimento, cuja atuação vem sendo discutida por diferentes posicionamentos teóricos, nos propusemos a analisar suas práticas, tomando como problema de pesquisa a pergunta: como se configuram as práticas do educador social nos Serviços de Convivência e Fortalecimento de Vínculos? Partindo do conceito operador práticas, nos lançamos em uma pesquisa-intervenção com a proposição de criação de espaços coletivos de análise para problematização das práticas do educador social. Nossa pesquisa se constituiu em dois planos analíticos constituídos inicialmente por uma análise de documentos, procurando responder questões históricas da emergência das práticas socioeducativas, articulando entradas no campo do trabalho social e da educação em sua emergência histórica, bem como a constituição de práticas dirigidas a crianças e adolescentes pobres – concebidos como “abandonados”, “delinquentes”, “em situação de vulnerabilidade ou risco social” – no Brasil, ao longo do século XX e início do século XXI, tendo Foucault como referência para uma análise discursiva; posteriormente por uma análise produzida a partir de encontros com educadores sociais, na perspectiva da pesquisa-intervenção, com base nos referencias teórico-metodológicos da Análise Institucional. Estes dois planos sustentaram um terceiro momento analítico em que colocamos em relação enunciados mapeados nos documentos e os analisadores construídos nos encontros com os educadores sociais. Evidenciaram-se traçados de estratégias de segurança, em seu caráter de regulação das populações e dos corpos. A estratégia de segurança que sustenta tanto uma convivência segura quanto um convívio seguro, parece operar uma estratégia de educação moral, através do aconselhamento, assim como produzir uma proteção vigilante, na medida em que a escuta além de acolhimento é também um espaço de confissão. A escuta apareceu como função não-formalizada do educador social, fazendo operar um mecanismo vigilante protetivo, que integra as intervenções nos serviços de convivência às intervenções da equipe técnica com as famílias acompanhadas na proteção social básica. O analisador coringa nos pareceu potente para a problematização e desnaturalização das práticas do educador social, na medida em que evidenciou tensões referentes à flexibilização de sua função, ao campo de saber – ou campos de saberes – em que se insere, e aos objetos alvo de sua intervenção. A proposta da pesquisa-intervenção e o conceito operador práticas nos remetem ao conceito de transversalidade, à busca de ampliação e abertura do coeficiente comunicacional, e produção de novos modos de ser e de pensar. Nesse sentido, o exercício constituído nessa pesquisa buscou operar deslocamentos, abalar evidências, problematizar práticas, visando não sua prescrição, mas a ampliação das análises, num exercício de luta e resistência conjunta em relação ao estado de coisas de um campo de práticas do educador social na assistência social. / This research is an intervention-research conducted with social educators working in social education activities on social assistance public policy in the city of São José dos Pinhais-PR. Social educator is a profession currently under discussion, in extensive growth and which performance has been discussed by different theoretical positions. The goal was to examine its practices, building the research problem: how are composed the social educators practices in prevention services for children on the social assistance public policy? Based on Foucault’s operator concept practices, in this intervention-research it was proposed the creation of collective analysis spaces for the problematization of social educators practices. The research is composed by two analytical plans. The first is a documental analysis, addressing historical issues of the emergence of socio-educational practices, linking entries in the field of social work and education in its historical emergence. It was also evaluated the establishment of practices that are focused at poor children and adolescents – so called as "abandoned", "criminals", "in social risk or social vulnerability"-in Brazil throughout the 20th century and early 21st century, using Foucault's concepts as a reference for a discourse analysis. The second analytical plan was based on the analysis from meetings with social educators, in the intervention-research perspective, based on Institutional analysis's methodological references. These two plans created a third analytical moment in which they were linked. As research results it was evidenced security strategies features, in its character of regulation of the population and of the bodies. A security strategy that seems to place both safe acquaintanceship and safe coexistence interaction, it also seems to operate a moral education strategy through the counseling, as well as produce a protective surveillance. In this strategy, the listening produces both refuge and confession. The listening appeared as non-formalized role of the social educators, creating a surveillance protective mechanism that integrates the interventions with families accompanied in social protection by technical staff. The word Joker seems to be a good analyser of social educators practices, for both problematization and denaturalization. It has highlighted tensions related to the flexibility of its function, its field of knowledge, and its target public. The intervention-research proposal and the operator concept of practices refer to transversality, as well as opening the communication coefficient, and the production of new ways of being and thinking. In this sense, the exercise proposed in this research sought to operate displacements, a problematization of practices and shatter evidences. Not seeking their prescription, but the extension of the analysis.
14

As práticas do educador social na política pública da assistência social: tensionamentos sobre um campo em dispersão

Rubini, Leila Ribeiro January 2015 (has links)
O presente estudo compreende uma pesquisa-intervenção realizada junto a educadores sociais que trabalham em serviços socioeducativos nos CRAS do município de São Jose dos Pinhais-PR. Partindo da constatação de que se trata de uma profissão atualmente em debate, em amplo crescimento, cuja atuação vem sendo discutida por diferentes posicionamentos teóricos, nos propusemos a analisar suas práticas, tomando como problema de pesquisa a pergunta: como se configuram as práticas do educador social nos Serviços de Convivência e Fortalecimento de Vínculos? Partindo do conceito operador práticas, nos lançamos em uma pesquisa-intervenção com a proposição de criação de espaços coletivos de análise para problematização das práticas do educador social. Nossa pesquisa se constituiu em dois planos analíticos constituídos inicialmente por uma análise de documentos, procurando responder questões históricas da emergência das práticas socioeducativas, articulando entradas no campo do trabalho social e da educação em sua emergência histórica, bem como a constituição de práticas dirigidas a crianças e adolescentes pobres – concebidos como “abandonados”, “delinquentes”, “em situação de vulnerabilidade ou risco social” – no Brasil, ao longo do século XX e início do século XXI, tendo Foucault como referência para uma análise discursiva; posteriormente por uma análise produzida a partir de encontros com educadores sociais, na perspectiva da pesquisa-intervenção, com base nos referencias teórico-metodológicos da Análise Institucional. Estes dois planos sustentaram um terceiro momento analítico em que colocamos em relação enunciados mapeados nos documentos e os analisadores construídos nos encontros com os educadores sociais. Evidenciaram-se traçados de estratégias de segurança, em seu caráter de regulação das populações e dos corpos. A estratégia de segurança que sustenta tanto uma convivência segura quanto um convívio seguro, parece operar uma estratégia de educação moral, através do aconselhamento, assim como produzir uma proteção vigilante, na medida em que a escuta além de acolhimento é também um espaço de confissão. A escuta apareceu como função não-formalizada do educador social, fazendo operar um mecanismo vigilante protetivo, que integra as intervenções nos serviços de convivência às intervenções da equipe técnica com as famílias acompanhadas na proteção social básica. O analisador coringa nos pareceu potente para a problematização e desnaturalização das práticas do educador social, na medida em que evidenciou tensões referentes à flexibilização de sua função, ao campo de saber – ou campos de saberes – em que se insere, e aos objetos alvo de sua intervenção. A proposta da pesquisa-intervenção e o conceito operador práticas nos remetem ao conceito de transversalidade, à busca de ampliação e abertura do coeficiente comunicacional, e produção de novos modos de ser e de pensar. Nesse sentido, o exercício constituído nessa pesquisa buscou operar deslocamentos, abalar evidências, problematizar práticas, visando não sua prescrição, mas a ampliação das análises, num exercício de luta e resistência conjunta em relação ao estado de coisas de um campo de práticas do educador social na assistência social. / This research is an intervention-research conducted with social educators working in social education activities on social assistance public policy in the city of São José dos Pinhais-PR. Social educator is a profession currently under discussion, in extensive growth and which performance has been discussed by different theoretical positions. The goal was to examine its practices, building the research problem: how are composed the social educators practices in prevention services for children on the social assistance public policy? Based on Foucault’s operator concept practices, in this intervention-research it was proposed the creation of collective analysis spaces for the problematization of social educators practices. The research is composed by two analytical plans. The first is a documental analysis, addressing historical issues of the emergence of socio-educational practices, linking entries in the field of social work and education in its historical emergence. It was also evaluated the establishment of practices that are focused at poor children and adolescents – so called as "abandoned", "criminals", "in social risk or social vulnerability"-in Brazil throughout the 20th century and early 21st century, using Foucault's concepts as a reference for a discourse analysis. The second analytical plan was based on the analysis from meetings with social educators, in the intervention-research perspective, based on Institutional analysis's methodological references. These two plans created a third analytical moment in which they were linked. As research results it was evidenced security strategies features, in its character of regulation of the population and of the bodies. A security strategy that seems to place both safe acquaintanceship and safe coexistence interaction, it also seems to operate a moral education strategy through the counseling, as well as produce a protective surveillance. In this strategy, the listening produces both refuge and confession. The listening appeared as non-formalized role of the social educators, creating a surveillance protective mechanism that integrates the interventions with families accompanied in social protection by technical staff. The word Joker seems to be a good analyser of social educators practices, for both problematization and denaturalization. It has highlighted tensions related to the flexibility of its function, its field of knowledge, and its target public. The intervention-research proposal and the operator concept of practices refer to transversality, as well as opening the communication coefficient, and the production of new ways of being and thinking. In this sense, the exercise proposed in this research sought to operate displacements, a problematization of practices and shatter evidences. Not seeking their prescription, but the extension of the analysis.
15

Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker

Lejdemalm, Roger, Andreasson, Daniel January 2008 (has links)
I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet. Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps. Framförallt nämndes det i samband med lanseringen av Windows Vista att säkerheten var det som stod högst på listan. Vi har tillsammans med WM-data i Stockholm tagit fram en programvara för fjärradministration av Windows. Huvudmålet var att med hjälp av våra baskunskaper i programmering skapa ett program för Windows XP och Windows Vista där en rad funktioner skulle kunna fjärrstyras utan att en användare vid den drabbade datorn upptäckte intrånget. I denna rapport beskrivs utvecklingen av programvaran och de tester som gjorts på de båda operativsystemen. Vidare delas begreppet ”skadlig kod” upp i kategorierna virus, maskar, trojaner samt rootkits och förklaras mer ingående tillsammans med en historisk bild över hur utvecklingen av skadlig kod har sett ut. / In media today, you often read about different security threats and risks that one has to be aware of. Many things must be taken into consideration in order to maintain your integrity and information secrecy. It might be new virus outbreak, a new trojan or some kind of spy ware that undetected finds the way to your computer. It’s hard to keep track of all terms and types of malicious code, and with greater understanding, the risk of infection decreases. The development when it comes to malicious code is as strong as the one in commercial software development. From the 80’s until present day, every area in the development of malicious code has evolved, from strategy and purpose to the pure complexity of the code. Microsoft, the worlds leading supplier of operating systems and web browsers, ensure us with every new release, that measures has been taken in order to enhance the security features. As the new operating system Windows Vista was released, spokesmen said that the security was now the highest priority. We have, together with WM-data in Stockholm, developed software for remote administration of Windows. The objectives where by using our limited programming skills only, to come up with a program for Windows XP and Windows Vista, where a number of functions could be remotely executed without alerting a user at the infected computer. This report describes the development of the software together with test results of execution on both operating systems. Further on, the report discusses different types of malicious code, such as viruses, worms, Trojans and root kits, together with a historical study of the development of malicious code.
16

Modelos de negócio para ambientes de computação em nuvem que consideram atributos de qos relacionados a desempenho e a segurança / Business models for cloud computing environments that consider attributes related to performance and security

Bruno Guazzelli Batista 10 November 2015 (has links)
Este projeto de doutorado tem como objetivo definir modelos de negócio para ambientes de computação em nuvem que consideram desempenho e segurança como atributos de qualidade de serviço durante a definição do contrato. Para isso, foi necessário quantificar o impacto causado no desempenho de um ambiente em nuvem quando diferentes mecanismos de segurança foram utilizados. Para a quantificação da sobrecarga foram utilizadas técnicas e metodologias disponíveis na literatura que visam garantir a integridade, disponibilidade e confidencialidade dos dados, abordando desafios que envolvem o acesso, armazenamento e manipulação de dados em serviços oferecidos por meio de máquinas virtuais. Experimentos executados possibilitaram analisar o comportamento das variáveis de resposta na utilização de cenários com diferentes mecanismos de segurança e cargas. Dessa forma, foi possível confrontar a sobrecarga imposta pelos mecanismos de segurança com a alteração da quantidade de recursos aplicada por um módulo proposto, chamado ReMM. De acordo com os resultados, o ReMM alterou a quantidade de recursos virtuais alocados utilizando dois algoritmos de escalabilidade, garantindo as exigências definidas no contrato de níveis de serviço. No entanto, a alteração dos recursos computacionais para contrapor a sobrecarga imposta pelos mecanismos de segurança impactou nos custos finais dos serviços. Dessa forma, a sobrecarga de segurança, desempenho e custo foram considerados na definição dos modelos de negócios em diferentes ambientes de computação em nuvem. / This PhD thesis has as main goal defining business models for cloud computing environments that consider performance and security as quality of service attributes during the service level agreement definition. For this, it was necessary quantifying the impact on the performance of a cloud environment in which different security mechanisms were applied. Techniques and methodologies available in the literature that aim ensuring the integrity, availability and confidentiality of data were used to quantify the overhead, addressing challenges related to access, storage and manipulation of data in services offered through virtual machines. Experiments were executed, in which the response variable behaviors were analyzed, using scenarios with different security mechanisms and workloads. In this way, it was possible to compare the overhead imposed by the security mechanisms with the changes in the quantity of resources applied by a module proposed, called ReMM. According to the results, the ReMM changed the amount of allocated virtual resources using two scalability algorithms, ensuring the requirements defined in service level agreement. However, the changes in the computational resources to face the overhead imposed by the security mechanisms influenced the final costs of the service. Therefore, security overhead, performance and cost were considered in the definition of business models in different cloud computing environments.
17

Less Detectable Web Scraping Techniques / Mindre Detekterbara Webbskrapningstekniker

Färholt, Fredric January 2021 (has links)
Web scraping is an efficient way of gathering data, and it has also become much eas- ier to perform and offers a high success rate. People no longer need to be tech-savvy when scraping data since several easy-to-use platform services exist. This study conducts experiments to see if people can scrape in an undetectable fashion using a popular and intelligent JavaScript library (Puppeteer). Three web scraper algorithms, where two of them use movement patterns from real-world web users, demonstrate how to retrieve information automatically from the web. They operate on a website built for this research that utilizes known semi-security mechanisms, honeypot, and activity logging, making it possible to collect and evaluate data from the algorithms and the website. The result shows that it may be possible to construct a web scraper algorithm with less detectability using Puppeteer. One of the algorithms reveals that it is possible to control computer performance using built-in methods in Puppeteer. / Webbskrapning är ett effektivt sätt att hämta data på, det har även blivit en aktivitet som är enkel att genomföra och chansen att en lyckas är hög. Användare behöver inte längre vara fantaster inom teknik när de skrapar data, det finns idag mängder olika och lättanvändliga plattformstjänster. Den här studien utför experi- ment för att se hur personer kan skrapa på ett oupptäckbart sätt med ett populärt och intelligent JavaScript bibliotek (Puppeteer). Tre webbskrapningsalgoritmer, där två av dem använder rörelsemönster från riktiga webbanvändare, demonstrerar hur en kan samla information. Webbskrapningsalgoritmerna har körts på en hemsida som ingått i experimentet med kännbar säkerhet, honeypot, och aktivitetsloggning, nå- got som gjort det möjligt att samla och utvärdera data från både algoritmerna och hemsidan. Resultatet visar att det kan vara möljligt att skrapa på ett oupptäckbart sätt genom att använda Puppeteer. En av algoritmerna avslöjar även möjligheten att kontrollera prestanda genom att använda inbyggda metoder i Puppeteer.

Page generated in 0.3722 seconds