Sök:

Sökresultat:

1212 Uppsatser om Asset-backed security - Sida 9 av 81

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

WHITE HOUSE/GREEN HOUSE - En processpårande undersökning av klimatfrågan i USA

This thesis examines the process of securitization of the environmental issue in the United States. By using the theories of sectoral security and securitization by Barry Buzan and Ole Waever, commonly known as the Copenhagen school we go beyond the traditional security frames and examine where the environmental issue in the United States stand today within the securitization spectrum. The securitizing spectrum includes three levels in which an issue can be place: non-politicised, politicised and securitized.The problem, which we wish to address, is if there is a movement of the environmental issue in the United States towards becoming a securitized issue. In the light of these circumstances we also wish to explore who is behind the movement and also find out where the issue stand today. We do believe that Al Gore is a securitizing actor and examine his role in the movement of the environmental issueWe have come to the conclusion that there is an ongoing process of securitization in which the environmental issue have moved from being politicised to becoming securitized..

Licenshantering : - Är företag medvetna om sin licenshanteringssituation?

I ett samhälle där upphovsrätten och immaterialrätten blir allt mer uppmärksammad är det viktigt för företag att vara medvetna om sitt innehav av licenser för mjukvaror. I detta arbete kommer företags medvetenhet om deras licenshanteringssituation att undersökas. I den här rapporten kommer problemställningen att undersökas med hjälp av intervjuer med företag. Dessa intervjuer kommer att ske via telefon och per e-post. Ett liknande arbete har tidigare inte gjorts och därför känns det relevant samt intressant att göra denna undersökning.Arbetet resulterade i intervjusvar från 11 företag.

EU:s gemensamma utrikes- och säkerhetspolitik - En studie om dess uppkomst och institutionella utformning

This thesis aims to explain the emergence of the Common Foreign and Security Policy of the European Union, and its institutional shaping, by using elements of Neofunctionalism and Liberal Intergovernmentalism.Using Neofunctionalism, the Common Foreign and Security Policy can be explained both as a side-effect of Europe's economic integration, and as a way to maintain the former and the European Union's position as an economic superpower. The institutional shaping is a result of lack of convergence between important national interests. Therefore it rests on a firm intergovernmental base, with rigorously limited use of supranational decision-making.For Liberal Intergovernmentalism, geopolitics and ideology, and to a certain level log-rolling, have played important roles. The reunification of Germany convinced France to form an alliance between the two countries. France, determined to achieve an economic and monetary union, thus offered Germany a political union, including a Common Foreign and Security Policy on intergovernmental terms.

Att förutspå avkastning på en global marknad : Prediktionsjämförelser av Capital Asset Pricing Model och Fama-French trefaktorsmodell

Denna studie jämför hur Capital Asset Pricing Model (CAPM) och Fama-French trefaktorsmodell förklarar och förutspår avkastning på en global aktiemarknad. CAPM utgår ifrån att investerarna förväntar sig en riskfri ränta adderat marknadspremien multiplicerat med företagens exponering mot marknaden. Fama-Frenchs är en utvidgning av CAPM modellen, där företagens storlek och book-to-market-värde läggs till som förklarande variabler för avkastning. Genom regressionsmodeller och prediktioner för portföljer indelade i storlek och book-to-market jämförs modellerna. Fama-French tycks vara genomgående bättre på att förklara och förutspå avkastning under perioden 1990m07-2013m02 för samtliga portföljer, förutom portföljen för stora företag med medelhögt book-to-market värde.

Kända Varumärke - Större, Starkare, Säkrare

In todays high-technological society where the Internet plays a central role in our day-to-day life, many e-retailers are not able to attract customers to complete a transaction on their website. In order to succeed, many e-commerce sites must improve several safety aspects regarding online payment, in order to be perceived as a reliable and secured retailer. The purpose of this paper is to investigate if increment in various combinations and aspects in online payment will in fact improve the customer's perception of the e-retailer and result in completed transactions. In order to investigate this aspect, an experiment was conducted to be able to compare eight independent groups, that each had been exposed to a different security scenario on the online payment website of either a known or unknown retailer. Our results clearly prove that perceived security of the retailer's payment website increases willingness to purchase from the retailer.

Folkpartiets syn på svensk säkerhets- och utrikespolitik 1956-1974 : En jämförande analys av Folkpartiets syn på svensk säkerhets- och utrikespolitiska frågor i förhållande till regeringen

The socialdemokrats? long possession of government power from the 1930?s to 1976 gave them the opportunity to put their stamp on Swedish domestic and foreign affairs in the shadow of the cold war. The government policy in security and foreign affairs, therefore, was that of the socialdemokratic party. The stance of the government has been researched, but it lacks focus on the opposition. The purpose of this paper is to analyse Folkpartiet´s view of security and foreign affairs in comparison with government policy.

Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen

Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.

Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov

The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

<- Föregående sida 9 Nästa sida ->