49 resultados para Security constraints

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Selostus: Maatalous pohjoisilla äärialueilla: ilmastolliset rajoitukset ja ilmaston muutosten vaikutukset viljelyyn

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Uusien mobiilien laitteiden ja palveluiden kehitys ovat herättäneet yritysten mielenkiinnon soveltaa langattomia sovelluksia omassa liiketoiminnassaan. Erilaisten tekniikoiden myötä myös mahdollisuuksien kirjo on laajentumassa, mikä johtaa erilaisten verkkojen ja laitteiden yhtenäiselle hallinnalle asetettavien vaatimusten kasvuun. Yritysten siirtyessä soveltamaan uusia langattomia palveluita ja sovelluksia on myös huomioon otettavaa sovellusten sekä palveluiden vaatima tietoturva ja sen hallittavuus. Tutkimuksessa esitetään langattoman sähköisen liiketoiminnan määritelmä sekä kyseisien teknologioiden käyttöä edistävät tekijät. Tutkimus luo viitekehyksen yrityksen langattomien teknologioiden käytölle ja siihen olennaisesti vaikuttavista tekijöistä. Viitekehystä on käytetty todelliseen esimerkkiin, liikkuva myyntihenkilö, kyseisten teknologioiden, palveluiden, tietoturvan ja hallittavuuden näkökulmasta. Johtopäätöksinä on arvioitu mobiilien ja langattomien teknologioiden sekä palveluiden, tietoturvan ja hallittavuuden tilaa ja analysoimalla niitä tulevaa ajatellen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkimuksen tavoitteena oli muodostaa viitekehys sijoittajaviestinnän strategian muodostamiseen ja soveltaa viitekehystä käytännössä. Tutkimusongelma nousi case-yrityksestä, SSH Communications Security Oyj:stä, joka listautui vuoden 2000 lopussa. Teoreettinen viitekehys perustuu aikaisempaan kirjallisuuteen sijoittajaviestinnästä, strategian kehittämisestä ja rahoitusteoriasta. Rahoitusteorian alueet, joita käsiteltiin tutkimuksessa ovat; vapaaehtoinen tiedottaminen, markkinatehokkuus ja agenttiteoria. Tutkimuksen empiirinen osa toteutettiin soveltamalla teoreettista viitekehystä case yritykseen. Empiirisessä osuudessa käytiin läpi seuraavat vaiheet; nykyisen tilan ulkoinen ja sisäinen analyysi, tavoitteiden asettaminen ja sijoittajaviestintä strategia ehdotuksen muodostaminen case yritykseen. Tutkielman viimeinen kappale kokoaa tärkeimmät löydökset, pohtii työn teoreettista kontribuutiota ja liikkeenjohdollisia kytköksiä sekä esittää tutkimuksen herättämiä ehdotuksia jatkotutkimuksille

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Low quality mine drainage from tailings facilities persists as one of the most significant global environmental concerns related to sulphide mining. Due to the large variation in geological and environmental conditions at mine sites, universal approaches to the management of mine drainage are not always applicable. Instead, site-specific knowledge of the geochemical behaviour of waste materials is required for the design and closure of the facilities. In this thesis, tailings-derived water contamination and factors causing the pollution were investigated in two coeval active sulphide mine sites in Finland: the Hitura Ni mine and the Luikonlahti Cu-Zn-Co-Ni mine and talc processing plant. A hydrogeochemical study was performed to characterise the tailingsderived water pollution at Hitura. Geochemical changes in the Hitura tailings were evaluated with a detailed mineralogical and geochemical investigation (solid-phase speciation, acid mine drainage potential, pore water chemistry) and using a spatial assessment to identify the mechanisms of water contamination. A similar spatial investigation, applying selective extractions, was carried out in the Luikonlahti tailings area for comparative purposes (Hitura low-sulphide tailings vs. Luikonlahti sulphide-rich tailings). At both sites, hydrogeochemistry of tailings seepage waters was further characterised to examine the net results of the processes observed within the impoundments and to identify constraints for water treatment. At Luikonlahti, annual and seasonal variation in effluent quality was evaluated based on a four-year monitoring period. Observations pertinent to future assessment and mine drainage prevention from existing and future tailings facilities were presented based on the results. A combination of hydrogeochemical approaches provided a means to delineate the tailings-derived neutral mine drainage at Hitura. Tailings effluents with elevated Ni, SO4 2- and Fe content had dispersed to the surrounding aquifer through a levelled-out esker and underneath the seepage collection ditches. In future mines, this could be avoided with additional basal liners in tailings impoundments where the permeability of the underlying Quaternary deposits is inadequate, and with sufficiently deep ditches. Based on the studies, extensive sulphide oxidation with subsequent metal release may already initiate during active tailings disposal. The intensity and onset of oxidation depended on e.g. the Fe sulphide content of the tailings, water saturation level, and time of exposure of fresh sulphide grains. Continuous disposal decreased sulphide weathering in the surface of low-sulphide tailings, but oxidation initiated if they were left uncovered after disposal ceased. In the sulphide-rich tailings, delayed burial of the unsaturated tailings had resulted in thick oxidized layers, despite the continuous operation. Sulphide weathering and contaminant release occurred also in the border zones. Based on the results, the prevention of sulphide oxidation should already be considered in the planning of tailings disposal, taking into account the border zones. Moreover, even lowsulphide tailings should be covered without delay after active disposal ceases. The quality of tailings effluents showed wide variation within a single impoundment and between the two different types of tailings facilities assessed. The affecting factors included source materials, the intensity of weathering of tailings and embankment materials along the seepage flow path, inputs from the process waters, the water retention time in tailings, and climatic seasonality. In addition, modifications to the tailings impoundment may markedly change the effluent quality. The wide variation in the tailings effluent quality poses challenges for treatment design. The final decision on water management requires quantification of the spatial and seasonal fluctuation at the site, taking into account changes resulting from the eventual closure of the impoundment. Overall, comprehensive hydrogeochemical mapping was deemed essential in the identification of critical contaminants and their sources at mine sites. Mineralogical analysis, selective extractions, and pore water analysis were a good combination of methods for studying the weathering of tailings and in evaluating metal mobility from the facilities. Selective extractions with visual observations and pH measurements of tailings solids were, nevertheless, adequate in describing the spatial distribution of sulphide oxidation in tailings impoundments. Seepage water chemistry provided additional data on geochemical processes in tailings and was necessary for defining constraints for water treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis studies capital structure of Finnish small and medium sized enterprises. The specific object of the study is to test whether financial constraints have an effect on capital structure. In addition influences of several other factors were studied. Capital structure determinants are formulated based on three capital structure theories. The tradeoff theory and the agency theory concentrate on the search of optimal capital structure. The pecking order theory concerns favouring on financing source over another. The data of this study consists of financial statement data and results of corporate questionnaire. Regression analysis was used to find out the effects of several determinants. Regression models were formed based on the presented theories. Short and long term debt ratios were considered separately. The metrics of financially constrained firms was included in all models. It was found that financial constrains have a negative and significant effect to short term debt ratios. The effect was negative also to long term debt ratio but not statistically significant. Other considerable factors that influenced debt ratios were fixed assets, age, profitability, single owner and sufficiency of internal financing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.