69 resultados para Site security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diplomityö muodostuu kahdesta kokonaisuudesta. Työn teoriaosa kertoo mitä ympäristöjohtaminen on, millaisia ovat multi-site -organisaatio ja multi-site -johtamisjärjestelmä sekä mitä vaatimuksia nämä asettavat yritykselle. Työssä esitetään malli, jota käyttämällä kansainvälisten johtamisjärjestelmästandardien mukaan rakennetut laatu-, ympäristö-, terveys- ja turvallisuusjärjestelmät voidaan yhdistää yhdeksi kokonaisuudeksi, multi-site - johtamisjärjestelmäksi. Malli rakentuu kolmesta tasosta, joita ovat paikallinen, maakohtainen ja konsernitaso. Esimerkkien avulla kerrotaan miteneri lähtökohdista voidaan näiden tasojen kautta edetä kohti yhtä johtamiskokonaisuutta. Esille tuodaan myös multi-site -johtamisjärjestelmän käyttöönottoa puoltavat ja vastustavat näkökohdat. Työn konkreettinen osa on johtamisjärjestelmämallin paikallisen tason toteuttaminen. Ympäristöjohtamisjärjestelmän rakentaminen standardin EN ISO 14001:2004 vaatimusten mukaiseksi Kvaerner Power Oy:n Suomen toimipaikoille sekä tämän järjestelmän yhdistäminen sertifioituun EN ISO 9001 -standardin mukaiseen laatujärjestelmään. Työssä kerrotaan miten ympäristöjohtamisjärjestelmä on rakennettu ja miten laatu- ja ympäristöjärjestelmät on liitetty yhdeksi kokonaisuudeksi. Työn tuloksena syntyi malli johtamisjärjestelmien yhdistämisestä sekä sertifioitu ympäristöjohtamisjärjestelmä, jonka yhdistäminen laatujärjestelmään toteutettiin tavoitteiden mukaisesti.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Työssä kehitettin läpinäkyvä Internet Small Computer Systems Interface-verkkolevyä (iSCSI) käyttävä varmistusjärjestelmä. Verkkolevyn sisältö suojattiin asiakaspään salauskerroksella (dm-crypt). Järjestely mahdollisti sen, että verkkolevylle tallennetut varmuuskopiot pysyivät luottamuksellisina, vaikka levypalvelinta tarjoava taho oli joko epäluotettava tai suorastaan vihamielinen. Järjestelmän hyötykäyttöä varten kehitettiin helppokäyttöinen prototyyppisovellus. Järjestelmän riskit ja haavoittuvuudet käytiin läpi ja analysoitiin. Järjestelmälle tehtiin myös karkea kryptoanalyysi sen teknistenominaisuuksien pohjalta. Suorituskykymittaukset tehtiin sekä salatulle että salaamattomalle iSCSI-liikenteelle. Näistä todettiin, että salauksen vaikutus suorituskykyyn oli häviävän pieni jopa 100 megabittiä sekunnissa siirtävillä verkkonopeuksilla. Lisäksi pohdittiin teknologian muita sovelluskohteita ja tulevia tutkimusalueita.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Uusien mobiilien laitteiden ja palveluiden kehitys ovat herättäneet yritysten mielenkiinnon soveltaa langattomia sovelluksia omassa liiketoiminnassaan. Erilaisten tekniikoiden myötä myös mahdollisuuksien kirjo on laajentumassa, mikä johtaa erilaisten verkkojen ja laitteiden yhtenäiselle hallinnalle asetettavien vaatimusten kasvuun. Yritysten siirtyessä soveltamaan uusia langattomia palveluita ja sovelluksia on myös huomioon otettavaa sovellusten sekä palveluiden vaatima tietoturva ja sen hallittavuus. Tutkimuksessa esitetään langattoman sähköisen liiketoiminnan määritelmä sekä kyseisien teknologioiden käyttöä edistävät tekijät. Tutkimus luo viitekehyksen yrityksen langattomien teknologioiden käytölle ja siihen olennaisesti vaikuttavista tekijöistä. Viitekehystä on käytetty todelliseen esimerkkiin, liikkuva myyntihenkilö, kyseisten teknologioiden, palveluiden, tietoturvan ja hallittavuuden näkökulmasta. Johtopäätöksinä on arvioitu mobiilien ja langattomien teknologioiden sekä palveluiden, tietoturvan ja hallittavuuden tilaa ja analysoimalla niitä tulevaa ajatellen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkimuksen tavoitteena oli muodostaa viitekehys sijoittajaviestinnän strategian muodostamiseen ja soveltaa viitekehystä käytännössä. Tutkimusongelma nousi case-yrityksestä, SSH Communications Security Oyj:stä, joka listautui vuoden 2000 lopussa. Teoreettinen viitekehys perustuu aikaisempaan kirjallisuuteen sijoittajaviestinnästä, strategian kehittämisestä ja rahoitusteoriasta. Rahoitusteorian alueet, joita käsiteltiin tutkimuksessa ovat; vapaaehtoinen tiedottaminen, markkinatehokkuus ja agenttiteoria. Tutkimuksen empiirinen osa toteutettiin soveltamalla teoreettista viitekehystä case yritykseen. Empiirisessä osuudessa käytiin läpi seuraavat vaiheet; nykyisen tilan ulkoinen ja sisäinen analyysi, tavoitteiden asettaminen ja sijoittajaviestintä strategia ehdotuksen muodostaminen case yritykseen. Tutkielman viimeinen kappale kokoaa tärkeimmät löydökset, pohtii työn teoreettista kontribuutiota ja liikkeenjohdollisia kytköksiä sekä esittää tutkimuksen herättämiä ehdotuksia jatkotutkimuksille

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this thesis is to examine the factors that have an impact on the location decision of new manufacturing site and to create the relative order of importance of these factors by analytic hierarchy process (AHP). The decision making process especially related to the location selection and the measurement of the location factors are also examined. In theoretical part the character of decision making process and the relevant methods are introduced. Based on the previous studies of other researchers, the location factors are examined and the main research method, analytic hierarchy process, is also introduced. The empirical part of the study mainly follows the phases of decision making process and is emphasized on the main stages of analytic hierarchy process; building the hierarchy, defining the priorities and analyzing the results. The hierarchy is constructed from seven main criteria which all have several sub criteria. The evaluation of the hierarchy is implemented at the group decision making –laboratory and there can be seen significant differences between the importance of criteria. The final stage in the study is to create the appropriate measurement scales to the chosen criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During recent years, mobile phone markets have changed significantly. Asian markets have become vital for the manufacturers with their millions of end users and multiple major mobile network operators. This has resulted in software development as global companies have research and development sites running in multiple locations, including Asia. The reasons behind this are not only in reducing labor costs but also in capitalizing on the local knowledge and knowhow. A ramp-up site has multiple effects in the software development and software release activities. This thesis focuses on representing the importance of software testing as part of software development process and highlighting issues that need to be considered during ramp-up activities. In addition this work tries to emphasize the importance of communication between parties and information gathering prior to setting up the ramp-up site. The output of this thesis was successful software testing site ramp-up within the set time limits. The quality of software testing work was assured and the ramp-up -project requirements were achieved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently most of the mobile phone manufacturer companies started to pay extra attention to their websites. This research investigates the sources of value creation on the mobile phone manufacturers’ website and the affect visiting the manufacturers’ website has on brand loyalty and brand satisfaction. The results show a correlation between positive website usage experience, brand loyalty and brand satisfaction. Moreover there is a relation between Novelty, Efficiency, Lock-in and the perceived usefulness the manufacturers’ website has on the mobile phone device. And finally the main reason behind Finnish student’s mobile phone brand loyalty is its country of origin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mining has severe impacts on its surrounding. Particularly in the developing countries it has degraded the environment and signigicantly altered the socio-economical dynamics of the hosts. Especially relocation disrupts people from their homes, livelihoods, cultures and social activities. Mining industry has failed to develop the local host and streghten its governance structures; instead it has further degraded the development of mineral rich third world countries, which are among the world poorest ones. Cash flows derived from mining companies have not benefitted the crass-root level that however, bears most of the detrimental impacts. Especially if the governance structure of the host is weak, the sudden wealth is likely to accelerate disparities, corruption and even fuel wars. Environmental degradation, miscommunication, mistrust and disputes over land use have created conflicts between the communities and a mining company in Obuasi, Ghana; a case study of this thesis. The disputes are deeply rooted and further fuelled by unrealistic expectations and broken promises. The relations with artisanal and illegal miners have been especially troublesome. Illegal activities, mainly encroachment of the land and assets of the mine, such as vandalising tailings pipes have resulted in profits losses, environmental degradation and security hazards. All challenges mentioned above have to be addressed locally with site-specific solutions. It is vital to increase two-way communication, initiate collaboration and build capacity of the stakeholders such as local communities, NGOs and governance authorities. The locals must be engaged to create livelihood opportunities that are designed with and for them. Capacity can also be strengthened through education and skills training, such as women’s literacy programs. In order to diminish the overdependence of locals to the mine, the activities have to be self -sufficient and able to survive without external financial and managerial inputs. Additionally adequate and fair compensation practises and dispute resolution methods that are understood and accepted by all parties have to be agreed on as early as possible.