
Sökresultat:
2133 Uppsatser om Computer security - Sida 2 av 143
Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.
In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.
Webbsäkerhet och vanliga brister : kunskapsläget bland utvecklare
This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
Vatten som säkerhetsfråga : Med FN:s konstruktion av vattenfrågan som utgångspunkt
ABSTRACTThe aim of this study is to analyse if the UN today constructs the water issue as a security issue and to argue about in which way the organization in that case does so alternatively why it can be said that the UN doesn?t construct the water issue as a security issue.In order to reach this purpose the following questions will be answered:?Does the UN construct the water issue as a security issue today?-If yes, in which way?-If no, why can it be said that the organisation doesn?t?The methods used are qualitative literature studies of policy documents on water from the UN. The focus is to analyze the ideas about water and to apply my theory on the concept of security, which is Barry Buzan?s framework on security, to these ideas.The main results showed that the UN strongly constructs the water issue as an environmental security issue for environments and species and in relatively strong terms also constructs it as an environmental security issue for civilisations. In rare cases the organisation constructs it as a societal security issue, but the UN doesn?t construct the water issue as a military, political or economic security issue..
Implementation av Network Admission Control
This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don?t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers.
En laptop till varje elev : en studie om gymnasieskolans satsning på datorer i undervisningen
The aim of this study is to highlight the computer as a learning resource in the education and give us knowledge about how the students uses the computer in year one in a selected High School where one computer per student were introduced in autumn 2011. The aim is also to contribute to the discussion about how the computer can become a natural learning resource for all students in all subjects, including the students in need of special support.How are the High School students using the computer?Are there differences in computer use, whether the student is in academic or vocational program?Are there differences in computer use between boys and girls?Do the student experience that the digital competence is increasing together with if they experience the computer as aid?In what degree do the teachers encourage the students to use the computer?How much do the students use the computer to learn mathematic?The study is based on a survey of all students in year one in a municipal High School.The result of the study is showing that the students first of all use the computer to play music, surf the Internet and to be logged in on social media (eg. Facebook). The students have learned to use the computer for the tasks they need, although the teachers don?t encourage the students to use the computer in any higher means, not in mathematics and not in other subjects.
Nord Stream - Vägen till säkerhet?
Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security.
Virtuella skrivbord i kommunal verksamhet
Today it?s common that companies and organizations are facing several challenges and problems when it comes to making their IT-environment more efficient. Some of these are the management of user?s computers and file security. Comput-er users are often tied to their personal computer due to personal programs and files.
Betydelsen av personligt varumärke hos chefer inom banksektorn
Today it?s common that companies and organizations are facing several challenges and problems when it comes to making their IT-environment more efficient. Some of these are the management of user?s computers and file security. Comput-er users are often tied to their personal computer due to personal programs and files.
Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011
This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks.The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models.
Trygghet och trygghetsskapande i arbetslivet
In this paper we examine what security is to the individual and how the individual creates and maintains security in their work. The purpose of this paper is to study how the creating of security in working life is performed. We conduct six semi-structured qualitative interviews with permanent employees in the private sector and we encode our material using thematic analysis. We analyze our material and illustrate our problem area on the basis of Anthony Giddens's theory of ontological security and give examples of how security and creating of security is performed at the empirical field with previous studies in the research area. Our survey shows that security for the individual at work seems to be about having continuity in everyday life, financial stability, a permanent employment, a challenging and fun job and a family in good health and good living.
En studie av SSL
Dokumentet är ett resultat av studier gjorda under kursen Kandidatarbete I
Datavetenskap. Arbetet utforskade, genom fallstudie, två egenskaper av
distribuerade informationssystem och relation mellan dessa: säkerhet och
prestanda. Målet med fallstudien har varit att belysa nackdelen med användning
av Secure Socker Layer (SSL) dvs. dess effekt på hastigheten och fördelen med
SSL, dvs. SSL:s roll i informationssäkerhetsarbetet.
Arbetet visar hur prestanda i ett tillämpad distribuerat informationssystem kan
påverkas av en SSL tillämpning.
Ungdomar och datorn : Vilken roll spelar datorn i ungdomars liv?
How does the computer influence teenagers' lives. I interviewed five young people, and gave a questionnaire to another 47, about this.What I found was that they were aware of and handled well the risks with the Internet and the computer, but had problems with the computer taking too much of their time. They wanted more time for their families and outdoor activities. It was mainly the Internet that seemed to have an influence on the teenagers, not the computer as a machine. They told me that there was a rough climate on the Internet, partly because of the possibility of being anonymous.
Datorspel till nytta eller nöje? En intervjuundersökning utifrån folkbibliotekariers perspektiv
This Masters thesis concerns computer games in Swedish public libraries. We have investigated the opinions of public librarians concerning what they think about computer games, and to what extent they believe it should be a part of the public library. The method we have chosen is qualitative interviews. The theory we have used is a pedagogical literature strategy, which we have reformulated so that it fits our investigation. The results show that the interviewed public librarians think that the library should offer computer games for children and youths to use at the library, and that they should offer computer games for lending, to all the library users.