• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • Tagged with
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Komparativní implementace trackovacího systému UAI PřF JU

HONNER, Tomáš January 2016 (has links)
The master's thesis deals with analysis of current solution of car tracking system on Faculty of Science at South Bohemia University and new solution proposal of this system and its implementation and comparison of this solutions. One part of the thesis is proposal of comparison methodology and an experiment with the goal of gaining data from comparison of both implementation. Furthermore, to evaluate results of these comparison and to create conclusion.
2

Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication / Security of consumer devices connected to the Internet : communication channel evaluation

Bachy, Yann 09 July 2015 (has links)
Aujourd’hui, les équipements intégrant du logiciel et connectés à Internet sont de plus en plus nombreux et variés. Avec l’arrivée de l’“Internet des objets” et la tendance au “tout connecté”, de nombreux équipements de notre quotidien bénéficient maintenant d’une connexion à Internet : les Smart-TVs, les lecteurs DVD, les systèmes d’alarmes, les systèmes domotiques, jusqu’aux équipements facilitant l’hospitalisation à domicile de patients par exemple. Ces évolutions technologiques s’accompagnent malheureusement de problèmes de sécurité. L’utilisation massive du réseau Internet a facilité la propagation de logiciels malveillants, qui peuvent aujourd’hui cibler tout type d’équipement informatique et notamment les équipements connectés. Alors qu’il existe déjà des normes permettant d’évaluer la sécurité d’équipements informatiques industriels, leur application aux équipements grand public est encore limitée. La présence et la criticité des vulnérabilités qui peuvent affecter ces équipements sont encore mal connues car elles n’ont pas fait l’objet d’études approfondies. C’est précisément l’objectif de cette thèse, qui propose une méthode permettant de mener une analyse de vulnérabilités des équipements grand public connectés à Internet. Cette méthode est constituée de deux grandes phases : une phase d’analyse des risques suivie d’unephase d’expérimentations. L’analyse de sécurité d’un équipement, quelle qu’elle soit, nécessite une bonne connaissance de l’environnement de celui-ci. Afin de guider l’évaluateur dans cette tâche, nous proposons, dans une première phase, de nous fonder sur des méthodes d’analyse des risques existantes. Ces méthodes sont aujourd’hui bien éprouvées et permettent à l’évaluateur d’obtenir une vue globale des risques encourus par l’utilisation de l’équipement étudié. Ensuite, lors de la seconde phase de l’étude, l’évaluateur se concentre sur les risques les plus importants afin de montrer la faisabilité technique des scénarios menant aux risques considérés, à l’aide d’expérimentations. Étant donné le grand nombre et la diversité des connexions présentes sur les équipements connectés, il est important de mettre l’accent sur les scénarios d’attaque qui peuvent s’avérer riches, même si ces scénarios ont pour origine une vulnérabilité locale simple. Pour cette seconde phase, une méthode d’expérimentation est donc proposée pour étudier ces scénarios d’attaque, qui, de plus, ciblent des équipementsdont les spécifications ne sont pas forcément disponibles. Afin d’illustrer la méthode globale, cette thèse se fonde sur deux cas d’étude : les box ADSL et les téléviseurs connectés. Ces études ont été menées sur un panel d’équipements provenant des principaux fournisseurs d’accès à Internet et des principaux fabricants de téléviseurs, ce qui nous a permis de comparer les différents équipements présents sur le marché. Les vulnérabilités mises en évidence concernent en particulier les liens de communication (boucle locale pour les Box ADSL, interface DVB-T pour les Smarts TVs) reliant les équipements à leurs fournisseurs de service (FAI pour les Box ADSL, TV et VoD pour les Smart TVs). Ces liens de communication sont habituellement considérés de confiance et ne sont à notre connaissance pas ou peu étudiés jusqu’à présent. Cette thèse contribue ainsi à l’analyse de sécurité sur ces liens particuliers des équipements connectés et met en lumière des chemins d’attaque originaux.Enfin, cette thèse se termine par la présentation des différents mécanismes de protection existants afin d’empêcher l’introduction ou l’exploitation des failles de sécurité identifiées. / Today, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
3

A Brazilian - Swedish Relationship : How to Establish a Successful International Joint Venture

Dalaryd, Magnus, Mayer, Daniel January 2012 (has links)
Due to the nature of globalization, new strategies have been designed to break into new markets. Joint Venture is a common strategy to enter new markets and by using a Joint Venture, companies share risks and establish new contacts with local knowledge. Brazil is a market where foreign investors gain more and more interest. Brazil's economy is growing fast and made well during the global financial crisis. The middle class in Brazil is constantly growing and for the first time, poverty is not a majority in Brazil.In an International Joint Venture (IJV), it is usually a foreign company establishing a partnership with a local company. Often, IJVs fail because companies have problems collaborating, depending on different variables. In this thesis, we chose to analyze the cultural barriers in a Brazilian-Swedish IJV on the Brazilian market. The purpose of this thesis is to gain an understanding and describe cultural barriers in an IJV partnership, and high-light those to increase the chances for successful IJVs between Brazilian and Swedish companies in the future.This thesis is qualitative, with an abductive approach, in order to gain a deeper and better understanding of experienced barriers. We have chosen to see culture from both a national and an organizational perspective as earlier research has showed that national culture affects the organizational culture within an IJV. Using Hofstede's (1991) four dimensions of national culture as a supplement to Wilson’s (2001) four factors influencing the organizational culture, we have conducted four interviews in two Swedish-Brazilian IJV companies located in São Paulo, Brazil. The companies we have chosen to interview have been small or medium-sized manufacturing. Interviews were conducted face-to-face in a comfortable environment for all respondents. In our analysis, we used matrices to make it easier to see what differences and/or similarities there are between the case-companies.Results of this study, demonstrate that the experiences from the two case-studies are well in line with each other. The organizational structure in Brazil has been perceived as more hierarchical than the Swedish vertical and more open structure. This in turn, has strengthened the differences in communication between managers and employees, which been perceived as more top-down in Brazil than in Sweden. Our conclusion is that cultural barriers have been perceived, in the perception of the leaders’ expected behavior, language barriers, differences in planning and management of uncertain situations, Brazil's more family-oriented society and close relationship between private life and work in the Brazilian market.Several of these barriers have been experienced during the early start-up of an IJV, something we believe increases the importance of being well prepared for cultural barriers that may arise. The importance of an agreement upon the structure and policies at the company at an early stage is crucial, to reduce future possible conflicts. Show mutual respect and understanding for one's partners’ culture and experienced cultural barriers, use these to avoid any negative effects, and instead create a positive impact for the IJV. / Minor Field Study

Page generated in 0.0183 seconds