• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 7
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 53
  • 14
  • 13
  • 12
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Ochrana datové sítě s využitím NetFlow dat / Network Protection Using NetFlow Data

Sedlář, Petr January 2010 (has links)
This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a summary of common security risks in term of their detection on network and transport layer. There are specified characteristics of NetFlow data containing samples of security risks. On the basis of these characteristics, an application for detection these risks is designed and implemented.
42

Vnitřní a vnější bezpečnost v Evropské unii. Měnící se role policie a armády v post-moderním státu / Internal and External Security in the European Union. The changing role of police and military in a post-modern state

Weiss, Tomáš January 2011 (has links)
This thesis analyses the security policy of the European Union and one of its member states. It aims at answering the question, whether internal and external security blurs in the EU, especially the differences between the two major security institutions - military and police. Using the concept of ideal types, an ideal type of a difference between the two bodies is introduced and subsequently tested on reality - on two case studies of the EU and the Czech Republic. There are three partial objectives: to find out if the roles of the military and the police blur at the level of the EU, if the European integration strengthens such blurring in the member states, and if the two bodies blur in a post-modern nation state. The thesis concludes that the real impact of declaratory changes is rather limited. Visible changes are caused by a subordination of external security concerns to prevention of internal ones. All changes are reversible easily, once the security discourse or political choices alter. The military and the police remain two distinct forces with different tasks and work methods.
43

Strategies to Minimize the Effects of Information Security Threats on Business Performance

Okoye, Stella Ifeyinwa 01 January 2017 (has links)
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had a minimum of 2 years experience in a leadership role, and had demonstrable strategies for minimizing the effects of information security threats in a SME. The thematic analysis of the interview transcripts revealed 10 strategies for reducing the effects of information security threats: network security, physical security, strong password policy, antivirus protection and software update, information security policy, security education training and awareness, network security monitoring and audit, intrusion detection, data backup, and people management. The findings may contribute to social change by providing SME leaders with more insight about strategies to minimize the effects of information security threats on business performance. The improved business performance can increase the flow of funds into the local economy and allow community leaders to provide social services to residents.
44

Information security and hybrid work : A case study of shifts in perceived information security when working hybridly

Nordmark, John, Källebo Rebermark, Oskar January 2023 (has links)
Hybrid work is already a big part of many organizations' structure. This phenomenon presents many new ways of how work is performed and carries new challenges with it. Parallel to that, the importance of working IT securely and coping with IT threats is significant in all fields of work. In this case study, we interview employees at a Swedish IT consultancy company, about their perceptions of hybrid work and their perceived ability to keep information secure in a hybrid work setting. Six employees from the company were selected for interviews. These interviews were then analyzed from the theoretical framework of Protection Motivation Theory which presents ways to explain how individuals are motivated to mediate threats alongside the ISO standard which is used to explain coping behaviors. This study concludes that the employees’ perception regarding the ability to keep information secure while working hybridly is diverse. Furthermore, the office has an important role in perceived security. The final finding reveals that current information security guidelines in ISO need to be updated or expanded to better guide organizations implementing remote work.
45

An exploration of the chasm in the protection of classified information in South African government departments

Mahlatsi, Lehlohonolo Wonderboy 08 1900 (has links)
The chasm in the protection of classified information in South African government indicates that all the departments have at their disposal information that is to some extent sensitive in nature and obviously requires security measures. This study shows that government officials who in their official duties come to contact with classified information are either vulnerable or are implementing the security controls incorrectly. It is also clear that in the absence of a comprehensive statutory framework, the government departments’ classified information has resulted in an unstable and inconsistent classification and declassification environment. The statutory framework would, in addition to other things, address the rising threat of espionage and antagonistic activities, the selling of information and the protection of critical records in government, without hindering the constitutional rights of citizens to access information. This would create a system of valuable informantion and clarify which information requires security measures with respect to the protection of classified information. / Kgaohanao e tshireletsong ya tlhahisoleseding e sireleditsweng ke mmuso wa Afrika Borwa e supa hore mafapha ohle a ona a na le tlhahisoleseding eo, ka ho hong, e leng ya sephiri mme e hloka maemo a tshireletso. Boithuto bona bo bontsha hore bahlanka ba mmuso bao, tshebetsong ya bona ya semmuso, ba teanang le tlhahisoleseding ya sephiri, ba kotsing hobane ba sebedisa ditaelo tsa polokeho ka mokgwa o fosahetseng. Ho boetse ho hlakile hore, bosikong ba moralo o phethahetseng wa semolao, disistimi tse sa sebetseng hantle tsa mafapa a mmuso tsa tlhahisoleseding ya sephiri di bakile tikoloho e sa tsitsang hape e sa hlophiswang ya tlhophiso le tloso ya tlhophiso ya tlhahisoleseding. Moralo wa semolao, hara tse ding, o ka sebetsana le phephetso e eketsehang ya bohlwela le diketsahalo tse ding tse belaetsang tse jwalo ka thekiso ya tlhahisoleseding, mme o sireletse direkote tsa mmuso tsa bohlokwa ntle le ho hatakela tokelo ya Molaotheo ya baahi ya phihlello ho tlhahisoleseding. Hona ho ka theha sistimi ya tlhahisoleseding ya bohlokwa le ho hlakisa hore na ke tlhahisoleseding efe e hlokang maemo a tshireletso ha ho tluwa ntlheng polokeho ya tlhahisoleseding ya sephiri. / Umsantsa okhoyo ekukhuseleni ulwazi olukhethekileyo kurhulumente woMzantsi Afrika ubonisa ukuba onke amaSebe anolwazi analo olunokuba nkenenkene, kwaye oludinga ukhuseleko. Esi sifundo sibonisa ukuba asesichengeni amagosa karhulumente aye athi apha ekusebenzeni kwawo, adibane nolwazi olukhethekileyo, ngoba azisebenzisa gwenxa iindlela zokulawula ukhuseleko. Kukwacaca ukuba, ekubeni kungekho sikhokelo namigaqo isemthethweni, iinkqubo ezingasebenzi kakuhle zamaSebe karhulumente, ulwazi olukhethekileyo aluhlelwa ngendlela eyiyo kwaye lufumaneka kwiimeko ezingaluphathi ngokukhetheka. Ubukho besikhokelo nemigaqo yokhuseleko lolwazi inganceda ekunqandeni isoyikiso esikhulu sobhukuqo mbuso nezinye iziganeko ezikrokrisayo, ezifana nokuthengiswa kolwazi, Esi sikhokelo singanceda nasekukhuseleni iingxelo zikarhulumente ezinkenenkene ngaphandle kokucinezela amalungelo abemi okufumana ulwazi njengoko uvuma uMgaqo Siseko. Oku kuya kuvelisa inkqubo yolwazi olunexabiso kwaye kuya kucacisa ukuba loluphi ulwazi oludinga imimiselo yokhuseleko malunga nokukhuselwa kolwazi olukhethekileyo. / Criminology and Security Science / M. Tech. (Forensic Investigation)
46

Challenges and Security Aspects of Blockchain Based Online Multiplayer Games​

Munir, Sundas, Baig, Mirza Sanam Iqbal January 2019 (has links)
Video gaming has always been a blooming industry. With the emergence of online multi- player video games , this industry’s worth have sky rocketed. Online multiplayer video games store data of player’s credentials, in-game progress, in-game virtual assets and payment details etc. Which mean security threats to these systems are nothing new and securing these games have always meant to protect player’s data from unauthorized breach. Integration of Blockchain technology in online multiplayer video games apart from other amazing features, provides a way to prove digital ownership of virtual assets with their verifiable scarcity. Trade of these in-game virtual assets have always been a goal for online multiplayer gaming companies, but there was none enough trust-able infrastructure available which can be relied on. Blockchain just solved that problem. It provided a platform for these asset’s secure and transparent transaction between players. Topic for our research not only consider the security challenges in online games but specifi- cally blockchain based online multiplayer games. This adaptation is still new and there is need of consideration of new security challenges. In this dissertation we try to bring out some important challenges related to security of blockchain based online multiplayer video games. There are currently no studies around security concerns and challenges of the integration of the online multiplayer video games in the emerging blockchain systems. In order to fill in the gap, this dissertation discusses and identifies two main security concerning questions related to this domain. Also this dissertation provides basic steps for expanding future research and application in this joint domain.
47

Optimalizace bezpečnostních schopností ozbrojených sil České republiky / Security capabilities optimalization of Czech military forces

Melich, Ladislav January 2013 (has links)
The topic of this diploma thesis is "Security capabilities optimalization of Czech armed forces". The original research aims to propose the strategic optimalization of the security capabilities of Czech armed forces. After the description of the evolution of the transformation of Czech armed forces from 1989 the thesis has offered an analysis of threats, risks and assets to Czech republic made on the basis of Czech strategic security documents. On this basis matrix of security risks has been created. Then preventive and liquidation measures that are necessary to adopt in case of emergency situations have been formulated. In the next section necessary security capabilities for realization of the measures have been suggested. Although the author examined all security capabilities necessary for elimination of security risks, major emphasis has been given to military capabilities. The actual military capabilities of Czech armed forces have also been described. The main aim of this thesis has been to define the strategic gap - the difference between desirable military capabalities and actual military capabilities - and to present strategic goals for approximately next twenty years.
48

A framework for higher academic institutions in the republic of South Africa to mitigate network security threats and attacks.

Mohapi, Matrinta Josephine 06 1900 (has links)
M. Tech. (Department of Information and Communication Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / The computer networks of higher academic institutions play a significant role in the academic lives of students and staff in terms of offering them an environment for teaching and learning. These institutions have introduced several educational benefits such as the use of digital libraries, cluster computing, and support for distance learning. As a result, the use of networking technologies has improved the ability of students to acquire knowledge, thereby providing a supportive environment for teaching and learning. However, academic networks are constantly being attacked by viruses, worms, and the intent of malicious users to compromise perceived secured systems. Network security threats and cyber-attacks are significant challenges faced by higher academic institutions that may cause a negative impact on systems and Information and Communications Technology (ICT) resources. For example, the infiltration of viruses and worms into academic networks can destroy or corrupt data and by causing excessive network traffic, massive delays may be experienced. This weakens the ability of the institution to function properly, and results in prolonged downtime and the unavailability of Information Technology (IT) services. This research determines challenges faced by higher academic institutions, identifies the type of security measures used at higher academic institutions, and how network security could be addressed and improved to protect against network security threats and attacks. Two research approaches were adopted, namely a survey and an experiment. Survey questionnaires were distributed to IT technical staff at higher academic institutions in Gauteng province to determine the challenges they face in terms of securing their networks. It is crucial that network security takes on a prominent role when managing higher academic institutions‘ networks. The results of the study reveal several challenges such as budget constraints, inadequate security measures, lack of enforcing network security policies, and lack of penetration testing on systems and the network. The results also reveal that the implementation of security measures can and does address network security threats and attacks. It is therefore extremely important for higher academic institutions to implement proper security measures to help mitigate network security threats and attacks. The framework proposed is based on the results from the research study to help mitigate network security threats and attacks at higher academic institutions.
49

Exército brasileiro: estrutura militar e ordenamento político 1984-2007 / The Brazilian Army: military structure and policy planning 1984 - 2007

Kuhlmann, Paulo Roberto Loyolla 10 December 2007 (has links)
Ocorreram amplas transformações nos sistemas militares de diversos países no período pós- Guerra Fria. No Brasil, o Exército replanejou sua força militar terrestre após a guerra das Malvinas mediante a implantação de um sistema de planejamento estruturado. Atualizações constantes foram feitas, mas as suas linhas principais podem ainda serem encontradas na remodelagem das unidades, missões e estrutura. Mesmo com a criação do Ministério da Defesa, o elemento político de direção nacional pouco interferiu. Essa reestruturação não tem correspondência direta com o modelo do pós-modernismo militar estruturado por Charles Moskos e que sugeria a transformação de grandes exércitos de conscritos em pequenos exércitos tecnologizados, cumprindo missões diferentes das tradicionais guerras inter-estatais. O desafio dos estruturadores da força terrestre foi de administrar poucos recursos com muita criatividade, especializando número crescente de profissionais de guerra terrestre, alargando o escopo das missões sem abrir mão das tradicionais, tornando algumas organizações militares mais operacionais, produzindo um salto de qualidade, ainda que tudo isso se desse sem interesse e sem direcionamento político. A ausência de clara direção política das forças armadas produz imprecisões na formulação de estratégias e de missões criando, por exemplo, sobreposição de missões auto-atribuídas com as de outros órgãos de segurança do Estado. / Broad transformations occurred in the military systems of many countries after the Cold War period. In Brazil , the Army re-dimensioned its military land forces after the Malvinas War when a planning system was structured and implemented. Despite of the continual changes the main lines can be found in the units remodeling, missions and structures. Even with the creation of the Ministry of Defense, the political elements interfered minimally. This restructuring has no direct connection with the post-modernist military model structured by Charles Moskos, which indicates the transformation of the big armies of recruited into the small technological armies with missions different from the traditional inter-state wars. The challenge for those involved in structuring the land forces was to creatively administrate the scarce resources to specialize land warfare professionals, broaden the number of missions without abandoning traditional missions and make military organizational even more operational attaining one leap of quality regardless of any political interest or guidance. The absence of clear political guidance of the armed forces can produce failures in the strategies and missions designs and this can produce, for example, overlaps of their own missions with those of other security organs of the State.
50

Modern piracy the impact on maritime security.

Mansfield, Charles T. January 2008 (has links) (PDF)
Thesis (Master of Military Studies)--USMC Command and Staff College, 2008. / Title from PDF title screen. Text document in PDF format. Includes bibliographical references (p. 21-22).

Page generated in 0.0904 seconds