• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 7
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 50
  • 13
  • 12
  • 11
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

From National Defence to International Operations? : A study on the transformation of Sweden's armed forces between 1989-2009

Kettil, Daniel January 2011 (has links)
Since the cold war, most countries have moved on from the classical security perception that all threats are external and aiming to invade the sovereignty of the state, thus leading to military armies fighting each other. Instead as Globalization have become more predominant since the beginning of the 1990’s new threats have also emerged that militaries can’t fight as they used to, thus it has become necessary for a wider view on security which also involves human suffering, and the general trend among armies have been to combat these through international peacekeeping and humanitarian operations. This study aims at showing the change in which the Swedish army have undergone since the end of the cold war and into modern days, both in terms of political decisions and also show how the use of language have been changed throughout the course. The thesis covers a time period between 1989 to 2009 and following the process of change from the Swedish political institution that works with military issues, called the Försvarsutskottet or the FöU and the method applied is process tracing with a detailed narrative. Several important conceptions are also explained such as Globalization, Collective security and Human security, which will make the result chapter more understandable. The results showed that the biggest changes in Sweden’s military policy came in three steps, the beginning of the 1990’s was influenced with economic problems for Sweden which also lead to budget downsizings in the military. The mid-1990’s was the time where there existed no real external threat to Sweden, and hence it came to be dominated by several large reforms which also aimed at lowering the costs of the military and adapt it into becoming rapid response forces. After the 9/11 attacks in 2001 the new threats emerged and the Swedish military focused even more on improving their international and humanitarian operations. The thesis ends by discussing these finding and present some changes in the use of languages in-between the 20 years.
32

Lutte aux botnets : les politiques de prévention s'avèrent-elles efficaces?

Allaire, Marie-Renée 07 1900 (has links)
No description available.
33

Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats

Larrimore, Nancy Page 01 January 2018 (has links)
Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operational security threats. Transformational leadership theory provided the conceptual framework for exploring the overreaching research question. Data collection consisted of semistructured interviews with each participant and the collection of company documents that pertained to security procedures, audits, and reviews. Conducting semistructured interviews allowed participants to provide details of real-life experiences. Recorded interviews and transcriptions were analyzed through Moustakas's modified van Kaam method of analysis to identify emerging topics. The 4 themes that emerged were: (a) operational security training and awareness, (b) operational security culture and behavioral effects, (c) operational security policy and compliance, and (d) operational security challenges and risk management. By developing strategies and processes that reflect these themes, small business leaders can reduce financial losses to improve profitability and reduce unemployment, achieving social changes that can benefit society as a whole.
34

Wi-Fi network security : Gender differences in China

Liuxinwei, Ma January 2015 (has links)
With the development of Wi-Fi networks, Wi-Fi connection become a very important part of people‟s life, it seems that Wi-Fi networks are everywhere, especially in China. However, Wi-Fi networks not only bring convenience to users, but also bring some security threats. Nowadays, Wi-Fi security problems become increasingly acute. This thesis investigates the differences between male and female users regarding Wi-Fi network security. By distributing a questionnaire in China, specific questions have been asked about key factors within the area of Wi-Fi security. The questions focus on the usage situation, information security awareness and the knowledge level in Wi-Fi related fields. The found result is: Wi-Fi security issues are more prominent for female users than for male users.
35

Money laundering and countermeasures : a comparative security analysis of selected case studies with specific reference to South Africa

Moodley, M.S. (Maiendra Sadanandan) 15 December 2008 (has links)
This study focuses on examining the security implications of money laundering and countermeasures, with reference to South Africa. The purpose of this study was to establish the following: <ul> <li> What is the extent, and what are the security implications of money laundering in South Africa;</li> <li> whether the current money laundering countermeasures in South Africa were effectively implemented from 1994 up to the end of 2006;</li> <li> if South Africa could implement better money laundering controls when compared to the G7/8 countries; and</li> <li> what the factors were that influenced money laundering in South Africa, compared to the G7/8 countries</li> </ul> This study also examined the validity of the following assumptions: <ul> <li>That there are still shortcomings in the practical application of money laundering countermeasures in South Africa, despite these countermeasures being based on the legislative measures adopted by the G7/8 countries; and</li> <li> money laundering promotes crime and corruption in South Africa.</li> </ul> An analysis of the South African anti-money laundering legislation indicated that South Africa had legislatively adopted all of the Financial Action Task Force money laundering recommendations. It was found that despite the strong legislative framework to combat money laundering in South Africa, these efforts were undermined by a lack of capacity; poor coordination that led to a large volume of reports being filed without a corresponding track record of successful prosecutions; and the failure to adopt advances in information technology. This led to a lack of effectively and efficiently translating the anti-money laundering legislation into practice in South Africa. / Dissertation (M(Security Studies))--University of Pretoria, 2008. / Political Sciences / unrestricted
36

Internet of Things based Smart Homes : Security Risk Assessment and Recommendations

Ali, Bako January 2016 (has links)
The Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. Over time, the most of connections in IoT are shifting from ‘Human to Thing’ to ‘Thing to Thing’. This technology is anticipated to become an essential milestone in the development of smart homes to bring convenience and efficiency into our lives and our homes. But, by bringing this IoT technology into our homes there will be important implications for security in these technologies. Connecting every smart objects inside the home to the internet and to each other results in new security and privacy problems, e.g., confidentiality, authenticity, and integrity of data sensed and exchanged by objects. These technologies are very much vulnerable to different security attacks that make an IoT-based smart home unsecure to live in and therefore it is necessary to evaluate the security risks to judge the situation of the smart homes. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing sufficient security and privacy assurance. As in all sectors, maintaining security will be a critical challenge to overcome. As homes are increasingly computerized and filled with devices, potential computer security attacks and their impact on residents need to be investigated. This report uses OCTAVE Allegro Methodology which focuses mainly on information assets and considers containers (technical, physical and people) and conducts a security risk assessment with the goal of highlighting various security flaws in IoT-based smart home, impacts and proposing countermeasures to the identified issues satisfying most of security requirements. Finally, it comes up with some recommendations to the users. The research findings documented into a thesis paper for secure IoT-based smart home systems and the resulted list and recommendations will be some useful contribution which can be used as a foundation for the specification of security requirements. For future work, the assessment will be extended to include more types of smart home applications rather than just typical one. / <p>Validerat; 20160620 (global_studentproject_submitter)</p>
37

Bezpečnostní rizika v pasivních optických sítích / Security Risks in Passive Optical Networks

Šimoník, Jan January 2018 (has links)
This diploma thesis deals with the historical development of passive optical networks, according to the standards that was defined by International Telecommunication Union (APON, BPON, GPON, XG-PON and NG-PON). Further, the thesis describes the security of passive optical networks, but also a security threats which the deployment and use of passive optical technology carry. In the introductory chapters of this thesis the passive optical networks are described. The following is a description of the standards of passive optical networks in terms of their historical development. The next part is dedicated to the security of passive optical networks and possible security threats. In conclusion a description of the practical part of this thesis is given -- rack assembly, which will serve for future testing. The basic configuration of the optical line terminations that are fitted in the rack is also described. The last part of this diploma thesis is dedicated to the testing of selected security risks, which was described in the theoretical part of this thesis.
38

Ochrana datové sítě s využitím NetFlow dat / Network Protection Using NetFlow Data

Sedlář, Petr January 2010 (has links)
This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a summary of common security risks in term of their detection on network and transport layer. There are specified characteristics of NetFlow data containing samples of security risks. On the basis of these characteristics, an application for detection these risks is designed and implemented.
39

Vnitřní a vnější bezpečnost v Evropské unii. Měnící se role policie a armády v post-moderním státu / Internal and External Security in the European Union. The changing role of police and military in a post-modern state

Weiss, Tomáš January 2011 (has links)
This thesis analyses the security policy of the European Union and one of its member states. It aims at answering the question, whether internal and external security blurs in the EU, especially the differences between the two major security institutions - military and police. Using the concept of ideal types, an ideal type of a difference between the two bodies is introduced and subsequently tested on reality - on two case studies of the EU and the Czech Republic. There are three partial objectives: to find out if the roles of the military and the police blur at the level of the EU, if the European integration strengthens such blurring in the member states, and if the two bodies blur in a post-modern nation state. The thesis concludes that the real impact of declaratory changes is rather limited. Visible changes are caused by a subordination of external security concerns to prevention of internal ones. All changes are reversible easily, once the security discourse or political choices alter. The military and the police remain two distinct forces with different tasks and work methods.
40

Strategies to Minimize the Effects of Information Security Threats on Business Performance

Okoye, Stella Ifeyinwa 01 January 2017 (has links)
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had a minimum of 2 years experience in a leadership role, and had demonstrable strategies for minimizing the effects of information security threats in a SME. The thematic analysis of the interview transcripts revealed 10 strategies for reducing the effects of information security threats: network security, physical security, strong password policy, antivirus protection and software update, information security policy, security education training and awareness, network security monitoring and audit, intrusion detection, data backup, and people management. The findings may contribute to social change by providing SME leaders with more insight about strategies to minimize the effects of information security threats on business performance. The improved business performance can increase the flow of funds into the local economy and allow community leaders to provide social services to residents.

Page generated in 0.0634 seconds