Sökresultat:
2709 Uppsatser om American security strategy - Sida 6 av 181
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Psykopaten i garderoben : En queer läsning av Bret Easton Ellis American Psycho
The novel American Psycho was first published in 1991. It recieved harsh criticism and was viewed as a work of heterosexism, misogyny and pointless violence. Despite the criticism, the protagonist, a wealthy serial killer yuppie namned Patrick Bateman, fascinated the readers. He hides his monstrosity behind a façade of heteronormativity, but this essay shows that the norms in American Psycho are fragile. Batemans relationships are shallow, his identity is constructed out of traditional masculinitynorms and even though he?s homophobic there?s a homoerotic undertone in the text, as well as gothic patterns that give the novel a fair amount of queerness too.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
MSBs respons p? cyberhot: En empirisk underso?kning av MSB:s framst?llning av ?kad cyberhotniv? efter invasionen i Ukraina.
This thesis aims to study how cybersecurity is managed and framed in the context of the
growing threat landscape as a result of the Ukraine Invasion. The war in Ukraine is one of the
first conflicts involving extensive cyber operations, furthermore this study is interested in
how Sweden, more specifically MSB, considers global security challenges and if they can
learn from the conflict in Ukraine. Through a qualitative text analysis, focusing on two
reports published by MSB, the study, using securitization and framing as theoretical
frameworks, seeks to answer the research question ?How has MSB changed its representation
of the threat and adapted its security strategy to address the increasing threat to cybersecurity
following the invasion of Ukraine??. The analysis is based on five operationalization
questions to clarify whether there are indications of securitization and framing in the reports.
The study also aims to identify if there is a more clear threat formulated to cybersecurity.
Gener som påverkar pälsens utseende och hälsan hos hästrasen American curly
American curly hästar har lockig päls och drabbas i vissa fall av hypotrikos vilket innebär håravfall. Många tappar förutom pälsen även manen och svansen när de fäller. Lockig päls förekommer även hos katt, hund, mus och tamråtta samt extremt lockigt eller ulligt hår hos människor. Flera av dessa är även drabbade av hypotrikos. Syftet med denna studie är att studera vilka gener som troligtvis styr utseendet och hälsan hos american curly.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
Gated communities : The american dream - den svenska mardrömmen?
This is an essay about gated communities and their impact on society. The key questions of my essay are: why people choose to live in gated communities; how the city is impacted by gated communities and what the difference concerning the reasons and impact of gated communities in Florida and Sweden is, and what this difference might depend on. I am using postmodern urbanism as a starting point, and I look closer on Edward J. Soja?s theories about the postmodern metropolis.
International Strategy Implementation: Understanding of Local Challenges in China
The thesis has two purposes. First, to give a practical insight into the challenges that Swedish companies might face, and how these challenges are tackled, when implementing strategy in a local area. Second, to develop a general applicable model as a conceptual contribution to the field of international strategy implementation in local areas. This empirical-driven thesis is written in a qualitative and explorative approach, where abduction is adopted in order to find mysteries and contribute to the forming of new theories. The empirical foundation is twenty-two interviews and observations of three large Swedish companies.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet
The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.
Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter
In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.
Att vara en vara : En studie av American Psychos Patrick Bateman
My essay is an investigation of American Psychos Patrick Bateman. Why is Patrick Batemans identity one so easily described as shallow and superficial? I discuss theese questions from a marxists point of view putting Bateman in the context of Georg Lukács theories of reification. I compare the structure of Patrick Batemans identity with the idea of an reified identity to se how the mechanisms of reification creates the entity that is Patrick Bateman.My conclusion is that one answer to Batemans shallowness is the phenomenon of reification. To get a grasp of how shallowness might be understood I combine the theories of Lukács with Bakhtins idea of the aouthorative discourse.If one look upon reification as an aouthorative discourse and one also presume that human existence is social and verbal the conclusion is that Patrick Bateman cannot exist because of what he is an example of.
Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter
Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..