Sökresultat:
1212 Uppsatser om Asset-backed security - Sida 10 av 81
Förstudie till införandet av centralt loggsystem hos Försvarsmakten
Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.
Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?
This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.
Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet
The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.
Anbudskalkyl mer användbar i byggprocessen
This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.
Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan
The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.
"Vart man kommer ifrån är en del av en" : En kvalitativ studie om betydelsen av sociala relationer i en mångkulturell skola
This thesis highlights the importance of social relationships for high school adolescents? identity in a multicultural school in Stockholm?s suburb. The second purpose of this thesis is to shed light on, if the school sees the students? cultural background as an asset and how teachers can take advantage and implement it to the way they teach .The theories in the study were developed by Urie Bronnfenbrenner; The ecological theory, Pierre Bourdeau; The three forms of capital and George H. Mead; The significant other, The generalized other and "I" and "Me".
Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008
Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.
Värderarens val av metod : Påverkansfaktorer vid företagsvärdering
Title: The appraiser?s choice of valuation method ? factors that influences the choice of company valuation methodsSeminar date: 04/06/07Course: Master thesis in Business Administration, 10 Swedish credits.Authors: Anne Benedicks and Veronica ÖbergAdvisor: Eron OxingProfession of category: Financial analysts, auditors and company lawyers.Key words: Company valuation, valuation methods, cash flow analysis, comparative valuation, the net asset value method.The Main Issue: What is of decisive importance when choosing a special company valuation method?Purpose: The purpose of this paper is to identify, analyse and evaluate the most common methods of valuation for financial analysts, auditors and company lawyers and those factors that influences the choice of method.Method: A multiple survey has been implemented for the actual profession categories. Primary data was collected through semi-structured interviews and a questionnaire survey.Theoretical: The theoretical frame of reference is based upon the paper?s dependent variable, i.e. the role of the appraiser.
Använder företag noterade på Large och Mid Cap en opportunistisk diskonteringsränta vid nedskrivningsprövning av sin goodwill?
Sedan 2005 är det genom en förordning av Europeiska unionen bestämt att svenska börsnoterade företag ska nedskrivningstesta sin goodwill. Diskonteringsräntan som appliceras vid denna nedskrivningsprövning är av väsentlig betydelse. Vi replikerar delvis en studie av Carlin & Finch (2009) som beräknade teoretiska diskonteringsräntor enligt Capital asset pricing model (CAPM) och jämförde med de diskonteringsräntor som börsnoterade företag i Australien använt i sin redovisning. Carlin & Finch (2009) ansåg att avvikelserna däremellan kunde förklaras genom utövanden som är diskretionära och att opportunistiskt beteende förekommer när företag sätter sin diskonteringsränta. Vi använder ett underlag bestående av Sveriges största börsnoterade företag, de som är noterade på Large Cap- och Mid Cap-listan på Stockholmsbörsen, och studerar hur andelen som redovisat en enligt CAPM avvikande diskonteringsränta förändrats sedan de nya redovisningsreglerna trädde i kraft år 2005 till år 2009.
Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner
Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last
decade and the area of information technology has been growing in the same
speed. As long as the surrounding environment evolves, the business models must
within the IT-area, keep the same pace. So, how do business corporations handle
this change to attract customers? How do the dominant business models look
like? In many cases, they are apparently much the same. But what differences
can we see and what areas can be improved?
We have showed that the IT area isn?t just one, it consist of several segments.
Säkerhetsmedvetenhet hos hemanvändare
IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter och prylar på en daglig basis. Arbetet tas med hem i en större grad med hjälp av laptops, VPN och molnmöjligheter. Mail kan tas emot i princip var och närsomhelst på dygnet. Men hur bra är säkerheten? På arbetsplatsen hanteras mycket av IT-säkerheten och ansvaret för den ofta av erfarna och dedikerade anställda, men hur ser det ut hemma där användaren själv har ansvaret för sin IT-säkerhet?I denna studie analyseras och identifieras risker och problem vid hantering av olika aktiviteter relaterade till IT-säkerhet i hemmet.
Behovsanpassad bevakning
The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.
Värderelevansen av Bokföringsdata - samband mellan immateriella tillgångar och marknadsvärde
In latter years there has been a discussion about the increasing importance of intangible assets and how to incorporate this fact into strategies, accounting and valuation. The ?Internet-bubble? is a recent event that drew much attention to intangible assets, and was an indicator of how complex it can be to value assets in general and intangible information in particular. Legislators recently addressed this issue by introducing IFRS3, which led to an update of IAS38, which in turn revised the methods for handling intangible assets. A specific intangible asset that has caused much debate is research and development (R&D), since it is commonly not allowed to be realized as an asset, which could cause implications concerning analysis and valuation.
Demokratins vara eller inte vara i Sydöstra Asien : En fallstudie av Vietnams förutsättningar för demokratisering.
This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.