Sökresultat:
1212 Uppsatser om Asset-backed security - Sida 8 av 81
peer2peer - hur dyrt är gratis?
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas
med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas
spyware alternativt adware, misstänks för att samla in personlig information,
så som e-mailadresser och lösenord. Det föreligger en risk att informationen
sedan säljs vidare eller används för att exempelvis rikta reklam....
Den europeiska arresteringsordern : ett rättssäkert förfarande?
The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.
Bristfällig säkerhet inom trådlösa routrar med fokus på WPS
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information.
Much of the information is confidential and should not be read by those not
privileged. To protect the information from unauthorized access cryptography
can be applied. The cryptography algorithms in use today all have their pros
and cons. They are therefore suited for different applications.
Förändringar i revisionsarbetet av kapitalförvaltningsbolag : En studie i hur revisionen av kapitalförvaltningsbolag har ändrats sedan den ekonomiska krisen 2008
Title:Changes in the auditing work of asset management companies.Advisor:Bengt BengtssonExaminer:Stig SörlingAuthors: Mattias Skog & Andrea CyganikPurpose:The purpose is to examine how the work of auditing asset management companies has changed since the crisis 2008.Methodology:The study is based on an adductive approach using a quantitative method.Theoretical framework:The theoretical framework includes previous studies and literature concerning the auditing business, the financial crisis, principal agent theory and stewardship theory.Empirical findings:The empirical material is based on answers from 22 auditors in 6 different auditing firms, and it was conducted by sending them a survey.Conclusion:The study showed that the major changes were changes in laws and regulations controlling the auditing business. New guidelines and laws were set to try and improve the quality of the auditing business while trying to restore stained reputation. New regulations were also set to increase the control the government have of inspecting the business through finansinspektionen..
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
Communicating criteria
In the light of the criticism from the Swedish Consumers? Association towards the actions of modern fund managers on the Swedish Sustainable and Responsible Investment (SRI)
market, discussions of change has increased. The reasons underlying a change and communication process are scarcely focused on. Thus, grounded on theories in the fields of
Critical Management Studies (CSR), Corporate Social Responsibility (CSR), change and communication, this study analyses how a change of implementing revised SRI
communication is carried out at Handelsbanken Asset Management, existing motives for the change in communication, and how key actors can affect the process. A participant observation and in-depth interviews were carried out enfolding a discussion that contributed
with a critical analysis and discussion, concluding external motives to be dominant and that key actors of the change process are influential to a various extent.