Sökresultat:
12426 Uppsatser om Data security - Sida 15 av 829
"Att föräldrarna får vara sig själva är den stora vinsten" : en studie med betoning på den kortare inskolningsmodellen i förskolan
I have examined acclimatization models in pre-school. My emphasis is on the shorter acclimatization models. To begin pre-school is a big change, not only for small children, for the whole family as well. It is important to get a good acclimatization in pre-school, and one of the things it takes to achieve that is to interact with the parents. The reason why I chose this subject was because we have not studied much literature about this subject during our education to become pre-school teachers.
Riktlinjer för implementering av ISO 17799
An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.
Tryggare kan ingen vara? En studie om den danska flexicurity-modellens lämplighet för Sverige
This paper discuss the possibilities to transfer the Danish labour market policy, called flexicurity, to Sweden. There are two main purposes of this essay. The first purpose is to discuss the reasons why the Danish labour market policy could be interesting for Sweden. The second purpose is to investigate which obstacles that might occur during the transfer. For guidance I have used two startingpoints which highlights the Danish flexicurity's pros and cons.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Stadsdelsförnyelse i Norra Björksätra, Sandviken
The housing estates in the outskirts of Sandviken, consist of relatively large scale apartment buildings. This report, that is a B.A. thesis at 10 Swedish university points, aims to investigate and describe the opportunities to improve safety and security for inhabitants in Norra Björksätra. The purpose with this report is to make Norra Björksätra to a more attractive place to live in, by changing the negative trends in the area. Since demolition of at least some of the houses could be of current interest in some years; the purpose is also to investigate whether demolition or renewal of the area is the best solution.
Dolt i det öppna
Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely.
Vikten av säkra nätverk
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.
En studie av zero knowledge-identifikationsprotokoll för smarta kort
Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.
Samverkan 4 U : En studie om samverkan med organisationen Here 4 U
The present study sought to examine the collaborative role of the student organization Here 4 U and the impact of this collaboration on the organization and its partners. As a point of departure a questionnaire was distributed to supervisors, principals and other cooperation partners of Here 4 U, the most prominent quantitative results of which were related to previous research, new institutional theory and empowerment theory. It turned out that partners interacting with Here 4 U felt that the collaboration was necessary and wanted to continue with it. The respondents to the questionnaire were asked to define the concept of collaboration. Factors emphasized by respondents included feeling of community, security, and common goals.
Ledningens skådespel: Hur tolkar aktieanalytiker bolagsledningars framföranden?
There has been an increase in the importance and amount of information concerning publicly traded stocks in recent years. When analyzing and valuing stocks finding new ways of collecting information has therefore increased in importance. This thesis aims to explore how meetings with management can impact the stock valuation done by the security analysts. Furthermore the case study examines what kind of information analysts can receive by interpreting management at these meetings. This case study of ten Swedish security analysts show that the analyst?s stock valuation is directly or indirectly affected by the meetings.
Small scale pig production in Takeo province ina rural area of Cambodia
Cambodia, in Southeast Asia, has tropical monsoonal climate with distinct dry and rain seasons. Many people are poor and live in rural areas. Farmers mainly culture rice, and raise pigs, cattle and poultry as well. During two months, a minor field study was performed in Cambodia. The main purpose was to evaluate the impact of contributions done by projects that started in 2005 and were managed by the local organization CelAgrid.
Sköra äldre patienters upplevelse av vistelsen på akutmottagningen
Background: The number of older people is increasing in Sweden. The elderly patient often requires a more complex type of care, than younger patients. The concept of frailty is often used to describe individuals who have a high biological age and a decreased physiologic reserve which could be associated with acute illness and an increased vulnerability. Emergency medical care today is not suitable for elderly patients and adaptions for these elderly patients and the demands this places on the health care is necessary. Mölndal Hospital emergency department has around 42 000 visitors per year, many of the clients have a high age.
Om solidaritet och ansvarstagande i världen : en diskursanalytisk studie kring internationaliseringen av svensk försvars- och säkerhetspolitik
The world is increasingly coalescing, ecologically, economically and culturally. Many problems can no longer be solved within the own state borders and the limitation of the territorial state is obvious. Jürgen Habermas means that a world domestic politic without a world government is what this progress need. Therefore it is important that national interests become less central and the solidarity between people is given priority in international relations. The focus of this thesis is therefore a critical discourse analysis of the current position of the internationalisation of Swedish security and defence policy.
Ip-telefoni med Skype som ett alternativ till PSTN för privatanvändare
The project is a practical and theoretical test of IP telephony with Skype in order to form a base for a comparison between IP-Telephony with Skype and the Public Switched Telephony Network (PSTN). PSTN is the common standard that most of us use for telephony today. The objective for the study is to simplify the choice between PSTN and IP-Telephony for the Swedish private customer user group. The project is supposed to answer the following questions. - How easy is it to start using IP-telephony with Skype? - How is the quality of IP-telephony compared to PSTN? - Are all services provided by PSTN available and accessible using the IP-solution? - How are the usability and the availability of support with IP telephony? - Is IP-telephony a cheaper solution and in that case under which circumstances? Within the project a collection of practical and theoretical tests have been performed to be able to form an opinion on the IP-solution in the following areas, installation, function, quality, usability, costs, accessibility and security.
Requirement Specification for Information Security to Health Systems, Case Study : IMIS
During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.