Sökresultat:
12426 Uppsatser om Data security - Sida 11 av 829
Ett livsfarligt yrke: En studie om motivation inom yrken med risk för hot och våld
The purpose of this study is to examine what factors that motivate people to work in professions with an explicit and inherent risk of threats and violence. By using a qualitative study and conducting in-depth interviews with eight security guards and doormen with experience from working at restaurants and nightclubs, the study could conclude that the interviewed security guards and doormen were motivated mainly by economic incentives and the social interaction that the profession entails. Status and riskiness of the profession did also, to a certain extent, contribute to the motivation. The professions' lack of advancement opportunities were frequently mentioned as the main reason to why one chose to leave the position, or consider the time in the profession as limited..
Att skapa grunden tillkassasystemsapplikationer för Android : Undersökande arbete samtimplementation
This paper was made together withTechPay AB, by their request.The dissertation has been divided into two separate parts; one of which is fully theoretical, with the focus on the security requirements of a digital cash register, and how to meet these requirements.The second part covers the implementation of anAndroid-oriented Java-library,created with help from the security requirements found in the first part. The purpose of this library is to make it easier to develop a cash register that uses payment terminals from TechPay.This paper also covers different communication protocols, encryption techniques and recommendations from authorities, banks and Android. This paper also contains a small review of how users are validated in applications on the current market that handles money transactions..
Historien om en svensk säkerhetspolitisk agenda - Förklaring av processen, politiken, policyn och entreprenören för Sveriges militära insats i Tchad
The aim of this study is to analyze the process of an agenda setting and see how a specific issue came to materialize on the security policy agenda. The empirical goal of the study is to see why Sweden chose to participate in the EU-led operation to Chad, and how that process came to be? The analysis is based upon Kingdon's multiple streams theory (2003) where he distinguishes the process into three streams. Central for his theory is the coupling of these streams and the importance of a policy entrepreneur. I complement Kingdon's theory of policy entrepreneurs by taking inspiration from Hinnfors (1995), Gustavsson (1999) and especially Eriksson (2000) and their analysis of policy change and agenda setting.
Utvärdering av SIEM-produkter
Denna rapport behandlar ett examensarbete med målet att hitta en paketering för resursövervakning i nätverk (NPMD - Network Performance Monitoring & Diagnostics) samt centraliserad logghantering (SIEM - Security Information & Event Management).Arbetet har utförts över fem veckor och bestod av att undersöka vilka produkter som kan vara möjliga att leverera till Ateas kunder genom att ta fram förslag på produkter och sedan utvärdera dessa i en virtuell testmiljö.Efter att två veckor av arbetet passerat beslutades att enbart SIEM-produkter skall utvärderas då vi annars inte kunnat hålla tidsramen på fem veckor. De första två veckorna bestod mestadels av efterforskning av olika produkter baserat på ett antal kriterier.Applikationen ska:? Stödja mallar och regler för Payment Card Industry Data security Standard (PCI-DSS)? Stödja korrelering av händelser? Ej vara open source eller en hårdvarulösningUnder resterande tre veckor installerades, konfigurerades och utvärderades de produkter som var intressanta för ändamålet. Utvärderingen av produkternas funktioner och egenskaper utfördes i en virtuella miljö. Resultatet av testerna är ett dokument som innehåller information om varje produkts förmågor samt betyg på varje produkt.
Att leva med implanterad defibrillator : En intervjustudie
The study aimed to explore how patients with ICDs experience their quality of life with a focus on everyday life, electric shocks, and how support from the health service is perceived. The studydesign is descriptive with a qualitative approach. Semi-structured interviews were conducted with seven patients. Data collection lasted for three weeks and interviews were conducted in the participant´s homes, at the participants? workplaces or over the phone.The study shows that most participants have learned to live with the ICD.
Att Visualisera Oron : Hotet, subjektet och terrorattentatet i Stockholm 2010
This study examines which socially constructed threats and subjects of security existed during the aftermath of the terrorist attacks in Stockholm 2010. With ideas of identity and difference as a starting point the theoretical framework is then developed with ideas from the new critical security studies including key subjects such as attributes, risk, imaging and visualisation. The study will be executed with the use of a discourse analysis approach using newspaper articles and chronicles as the principal empirical material. The analysis will then follow two separate themes. Firstly, the different threats and subjects of security will be deduced, and also, how these social constructions inevitably create each other and require each other to continue existing.
Informationssäkerhet inom grafiska företag
The study shows the current need for security solutions concerning work with information in different areas.Investigations will show important solutions for printers? needs to meet the increasingly harder demands forfast and safe digital communications. Important factors to be analyzed in the investigations are: access todifferent types of information, workers authority of information, access to the data base register internallyand externally, production solutions for an effective fault detection and data base solutions fororders and distribution.Planned and unplanned stops result in a standard of value in interruptions. Internal data bases areprotected by so-called ?Fire Walls?, ?Watch Dogs? and Virtual Private Networks.
Webbplats med Jeopardyspel med CodeIgniter
Detta examensarbete kommer att behandla hur man kan skapa en webbplats med tillhörande spel med hjälp av PHP-ramverket CodeIgniter. Rapporten tar upp hur detta ramverk fungerar och hur applikationer i ramverket kan göras säkra. Läsaren kommer att få veta mer om vilka HTML-standarder man kan använda för webbplatser och om den programmeringsmetod, MVC-principen, som CodeIgniter använder sig av. Kortfattat tar rapporten upp teknisk webbutveckling och programmeringen bakom densamma..
Försäkringskassan- effektiv och/eller rättssäker?
The public administration and its officials have a number of values which they have to relate to in their work. The values are a set of democratic and economic values.This study?s purpose is to examine how the officials at the National Insurance Office in Sweden give priority to these values. The study is performed by interviews with officials at two insurance offices.The study shows that the officials in a high degree value the democratic values legal security and public ethics. In turn they experience that productivity, which is an economic value, is being promoted in a high degree from the management.
Den svenska neutralitetsdebatten 1988-1992
Starting at the end of the Cold War, this publication assesses the impact of the upheavals in Eastern Europe and the atrophic Soviet Union on the Swedish doctrine of neutrality with its 200 year old tradition. Since the end of world war two the proximity of the Soviet Union had constituted the major impetus for upholding a position of neutrality and as this vanished a pressure for change was created. This essay works with a theoretical framework delineated by Kjell Goldmann and under this disposition, the Swedish tradition of neutrality, governmental positions, opposition and four major influential newspapers are studied. The standings of each variable are canvassed in an attempt to explain the development of Swedish security policy during the crucial years of 1988-1992..
Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform
Dagens moderna organisationer driver vanligtvis en kostsam IT-baserad infrastruktur. De besitter högpresterande funktionalitet och säkerhet för att garantera att de dagliga operationerna fortskrider. Mjukvarubaserade lagringsplattformar är ett alternativ som kan användas för att reducera dessa kostnader. Genom att efterlikna avancerad teknik som redan existerar i traditionella lagringsplattformar kan detta implementeras som mjukvara på commodity hardware i syfte att uppnå samma funktionalitet. Ceph är ett alternativ som numera implementeras och ämnar erbjuda detta val.
Att nyttja marken 30 meter från järnvägen : hur platser, syften och miljö vävs samman
The purpose of this work is to raise ideas and interest for land that is very much forgotten,unused and neglected in terms of maintenance and usability. Railroads are often seen as adirty and loud intrusion in the landscape and therefore cities turn their backs on them. Theland around railroads is not considered useful despite its often central location and scrublandis common in these areas.The starting point of this work is the restrictions and possibilities linked to the land withinthe security distance 30 meters from the railroad center. Within this security distance thereare numerous limitations and regulations due to the nature of railroad use. These limitationsare counted for in the initial chapter and lay the foundation for the rest of the work.
Rättsäkerheten vid omhändertaganden av barn på 1950 - 1960 - talet : Studier av socialarbetarnas dokumenterade arbete
The main purpose of this study is to examine and gain increased knowledge concerning the legal security of children taken into protective care. The purpose is also to enable contemporary social workers to reflect around phenomena in today´s social work, among other things how investigations are carried out surrounding children taken into protective care thought this historical study. To find out how social workers dealt with caretakings I have chosen to examine the personel files that the social workers compiled for each child and also interview a man who worked as a social worker at the time of the investigation. The paper is divided into two part studies were the first one studies legal security through Mattsson´s (2002) further development of KjÆnstad?s way to analyse legal security, namely through investigating the clarity of the law, procedural rules and the comtetenay of the social workers.
Flexibiliteten på arbetsmarknaden : Ett genuint utbyte mellan bemanningsbranschen och dess anställda?
The flexibility of the labour market is considered as an instrument for increasing economic growth.Therefore has the use of flexible employment, also called atypical employment, increased. The atypical employment is characterized by insecurity in comparison with a traditional permanent full- time employment. One of the most common atypical employments is the manning employment, which is insecure whether it is permanent or not. The insecurity in the industry is based on insecure income, unpredictable working hours and poor psychosocial work environment.In order to encourage a continued increase of flexibility in the labour market while the need for security for staffing employees would be satisfied was Directive 2008:104 adopted. A certain amount of security has been achieved.
Inloggning : Lösenordskryptering och Brute force attack
This report is the result of a sub-project of a larger project to create a platform formathematical education. The sub-project focuses on authentication with associ-ated security, where security is emphasized. The project environment is Java EE 6where GlassFish 4.0 acts as the server. The project has been divided into threeparts; password encryption, Java EE authentication and brute force attack. Thepassword encryption part focuses on examining different hash functions executionspeed, the result shows that none of the examined hash algorithms is suitable fordirect use.