36 resultados para Cyber-Dating

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Fog of Cyber Defence is a book about cyberspace, cyber security and cyberwar. The book is untangling the ties of the Nordic states with the important, yet complex and foggy phenomenon of cyber. It is adding important perspectives into the ongoing discussion about cyber security and creating room for the deepening of co-operation amongst the Nordic states. The articles in the book contribute to the debate over the implications of cyber for national security and the armed forces. The authors, who come from various professional backgrounds, appreciate and welcome further discussion and comments on the very important themes that impact our everyday lives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Cyber Warfare held at the Department of Military Technology of the National Defence University in the fall of 2012. This book is a collection of some of talks that were presented in the seminar. The papers address computer network defence in military cognitive networks, computer network exploitation, non-state actors in cyberspace operations, offensive cyber-capabilities against critical infrastructure and adapting the current national defence doctrine to cyber domain. This set of papers tries to give some insight to current issues of the cyber warfare. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tässä sivuaineen tutkielmassa tarkastellaan, miten naisiin viittaavat sanat on käännetty suomalaisen, mutta pääosin englanniksi puhutun Love Connection -tosi-tvohjelman suomenkielisissä tekstityksissä. Tavoitteena on selvittää, millä tavoin suomen ja englannin puhekielen erot naispuolisiin henkilöihin viitattaessa näkyvät ruututeksteissä, ja millaisia käännösstrategioita ohjelman kääntäjä on sarjaa suomentaessaan käyttänyt. Lisäksi tv-ohjelmassa tehtyjä naisiin kohdistuvia viittauksia verrataan ohjelman englanninkielisessä mainoslehtisessä käytettyihin naisiin viittaaviin sanoihin. Tutkimuksen primäärimateriaali koostui Love Connection -tv-sarjan 12 osasta sekä niiden suomenkielisestä tekstityksestä, ohjelman Yhdysvaltoihin suunnatusta mainoslehtisestä sopivien osallistujien löytämiseksi sekä sarjan kääntäjän haastattelusta. Tutkimus toteutettiin sekä kvalitatiivisin että kvantitatiivisin menetelmin. Tv-ohjelman jaksoista litteroitiin englanninkielinen puhe ja suomenkielinen tekstitys niiltä osin kuin vähintään toisessa esiintyi viittaus naispuoliseen henkilöön, kuten woman/nainen tai girl/tyttö. Aineistosta poimitut viittaukset sijoitettiin lähdekirjallisuuden pohjalta luotuihin kategorioihin sen mukaan, millaista käännösstrategiaa niihin oli sovellettu. Lisäksi tarkasteltiin, millaisia eroja sovelletuissa käännösstrategioissa ilmeni ohjelman osallistujien tekemien viittausten välillä sekä toisaalta yksilöhaastattelujen ja keskustelutilanteiden välillä. Analyysi ja kääntäjän haastattelu osoittivat, että suurin osa viittauksista käännettiin suomeksi lähimmällä semanttisella vastineella, mutta myös poistoja ja korvauksia esimerkiksi pronominilla oli tekstityksen vaatimien tila- ja aikarajoitusten vuoksi käytetty runsaasti. Merkittävin tutkimushavainto oli, että joissakin yhteyksissä englannin kielen sana girl oli käännetty suomeksi sanalla nainen suoran käännösvastineen sijasta, koska suomen kielen sana tyttö ei kyseisissä konteksteissa olisi soveltunut käytettäväksi aikuisesta naisesta puhuttaessa. Suomalaisten tuottajien laatimassa englanninkielisessä mainoksessa esiintyi suurelta osin kuvaannollisia, sukupuolineutraaleja henkilöviittauksia, eikä girl-sanaa käytetty kertaakaan. Audiovisuaalisten käännösten kautta välittyvää naiskuvaa viihdegenren televisioohjelmissa on toistaiseksi tutkittu vähän, joten jatkotutkimusten kannalta vaihtoehtoja on runsaasti. Tulosten laajemman sovellettavuuden arvioimiseksi naisten puhuttelua voisi tutkia tarkemmin muissa, kansainvälisesti tunnetuissa tositv-formaateissa esimerkiksi vertailemalla eri maissa esitettäviä ohjelmaversioita.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents security issues and vulnerabilities in home and small office local area networks that can be used in cyber-attacks. There is previous research done on single vulnerabilities and attack vectors, but not many papers present full scale attack examples towards LAN. First this thesis categorizes different security threads and later in the paper methods to launch the attacks are shown by example. Offensive security and penetration testing is used as research methods in this thesis. As a result of this thesis an attack is conducted using vulnerabilities in WLAN, ARP protocol, browser as well as methods of social engineering. In the end reverse shell access is gained to the target machine. Ready-made tools are used in the attack and their inner workings are described. Prevention methods are presented towards the attacks in the end of the thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing dependency of everyday life on mobile devices also increases the number and complexity of computing tasks to be supported by these devices. However, the inherent requirement of mobility restricts them from being resources rich both in terms of energy (battery capacity) and other computing resources such as processing capacity, memory and other resources. This thesis looks into cyber foraging technique of offloading computing tasks. Various experiments on android mobile devices are carried out to evaluate offloading benefits in terms of sustainability advantage, prolonging battery life and augmenting the performance of mobile devices. This thesis considers two scenarios of cyber foraging namely opportunistic offloading and competitive offloading. These results show that the offloading scenarios are important for both green computing and resource augmentation of mobile devices. A significant advantage in battery life gain and performance enhancement is obtained. Moreover, cyber foraging is proved to be efficient in minimizing energy consumption per computing tasks. The work is based on scavenger cyber foraging system. In addition, the work can be used as a basis for studying cyber foraging and other similar approaches such as mobile cloud/edge computing for internet of things devices and improving the user experiences of applications by minimizing latencies through the use of potential nearby surrogates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Työn tavoitteena on tutkia deittipalvelun käyttäjien anonyymiaineistoa neuroverkko-opetuksessa segmentoituneiden piirrekarttojen (SOM, Self-Organizing Map) avulla. Näiden piirrekarttojen avulla on tarkoitus selvittää, löytyykö mahdollisesti selkeitä SMS- ja e-mail - käyttäjäryhmiä. Tutkimusta lähestytään perehtymällä ensin yrityksen tekniseen palvelualusta-arkkitehtuuriin ja myös varsinaiseen deittipalveluun käyttäjän kannalta.Tutkimus aloitettiin koodaamalla tietoaineisto SOM Toolbox-ohjelmalle käytettäväksi. Varsinaisia tutkimustuloksia analysoitiin valitsemalla otoksia neuroverkko-opetuksessa segmentoituneista piirrekartoista. Saadut tulokset osoittavat, ettäSOM-teknologia soveltuu hyvin sisältöpalveluiden sosioteknologiseen tutkimukseen ja sitä on myös mahdollista käyttää asiakkuudenhallinnassa erilaisten käyttäjäryhmien profilointiin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this study is to explore the role and importance of different animal species in Turku through an analysis of osteological data and documentary evidence. The osteological material used in this study is derived from two town plots in Turku dating from the 13th century to the 19th century. The osteological material deposited in Turku represents animals bred both in the town and in the surrounding landscape. Animal husbandry in SW-Finland can also be examined through a number of historical documents. The importance of animals in Turku and its hinterland are closely connected and therefore the roles of the animals in both urban and rural settings are examined. The study has revealed the complexity of the depositional patterns in medieval and post-medieval Turku. In the different areas of Turku, characteristic patterns in the osteological material and different deposit types were evident. These patterns are reflections of the activities and therefore of the lifestyles practiced in Turku. The results emphasise the importance of context- awareness in the study of material culture from archaeological sites. Both the zooarchaeological and historical sources indicate that cattle were important in animal husbandry in Turku from the Middle Ages up to the 19th century. Sheep were the second most common species. When taking into consideration the larger size of cattle, the dominance of these animals when it come to meat consumption seems clear even in those phases where sheep bones are more abundant. Pig is less abundant in the material than either cattle or sheep and their importance for subsistence was probably fairly modest, albeit constant. Goats were not abundant in the material. Most of the identified goat bones came from low utility body parts (e.g. skulls and lower extremities), but some amount of goat meat was also consumed. Wild species were of minor importance when it came to consumption practices in Turku. The changes in Turku’s animal husbandry patterns between the medieval and post medieval periods is reflected in the change in age of the animals slaughtered, which was part of a wider pattern seen in North- and Central Europe. More mature animals are also present in the assemblages. This pattern is related to the more pronounced importance of cattle as a manure producer and a draught animal as a result of the intensification of crop cultivation. This change seems to occur later in Finland than in the more Southerly regions, and indeed it did not necessarily take hold in all parts of the country.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation discusses Holocene palaeoenvironmental and palaeomagnetic secular variation (PSV) records reconstructed from sediments preserved in Lake Lehmilampi (63º37´N, 29º06´E) and Lake Kortejärvi (63º37´N, 28º56´E) in eastern Finland. Several piston and freeze cores were obtained from both lakes for varve and magnetic analyses. Sediment samples were impregnated in low-viscosity epoxy and physical parameters of varves, including varve thickness and relative grey-scale values, were recorded using x-ray densitometry combined with semiautomatic digital image analysis. On average, varve records of Lehmilampi and Kortejärvi cover 5122 and 3902 years, respectively. Past solar activity, as estimated by residual 14C data, compares favourably with varve thicknesses from Lehmilampi during the last 2000 years. This indicates the potential of clastic-organic varves to record sensitively climatic variations. Bulk magnetic parameters, including magnetic susceptibility together with natural, anhysteretic and isothermal remanent magnetizations, were measured to describe mineral magnetic properties and geomagnetic palaeosecular variation recorded in the sediments. Main stages in the development of the investigated lakes are reflected in the variations in the mineral magnetic records, sediment lithology and composition. Similar variations in magnetic parameters and sediment organic matter suggest contribution of bacterial magnetite in the magnetic assemblages of Lehmilampi. Inclination and relative declination records yielded largely consistent results, attesting to the great potential of these sediments to preserve directional palaeosecular variation in high resolution. The PSV data from Lehmilampi and Kortejärvi were stacked into North Karelian PSV stack, which may be used for dating homogenous lake sediments in the same regional context. Reconstructed millennial variations in relative palaeointensity results are approximately in agreement with those seen in the absolute palaeointensity data from Europe. Centennial variations in the relative palaeointensity, however, are influenced by environmental changes. Caution is recommended when using varved lake sediments in reconstructing relative palaeointensity.