
Sökresultat:
18264 Uppsatser om Information Security - Sida 12 av 1218
En studie av SSL
Dokumentet är ett resultat av studier gjorda under kursen Kandidatarbete I
Datavetenskap. Arbetet utforskade, genom fallstudie, två egenskaper av
distribuerade informationssystem och relation mellan dessa: säkerhet och
prestanda. Målet med fallstudien har varit att belysa nackdelen med användning
av Secure Socker Layer (SSL) dvs. dess effekt på hastigheten och fördelen med
SSL, dvs. SSL:s roll i informationssäkerhetsarbetet.
Arbetet visar hur prestanda i ett tillämpad distribuerat informationssystem kan
påverkas av en SSL tillämpning.
Att skapa grunden tillkassasystemsapplikationer för Android : Undersökande arbete samtimplementation
This paper was made together withTechPay AB, by their request.The dissertation has been divided into two separate parts; one of which is fully theoretical, with the focus on the security requirements of a digital cash register, and how to meet these requirements.The second part covers the implementation of anAndroid-oriented Java-library,created with help from the security requirements found in the first part. The purpose of this library is to make it easier to develop a cash register that uses payment terminals from TechPay.This paper also covers different communication protocols, encryption techniques and recommendations from authorities, banks and Android. This paper also contains a small review of how users are validated in applications on the current market that handles money transactions..
Historien om en svensk säkerhetspolitisk agenda - Förklaring av processen, politiken, policyn och entreprenören för Sveriges militära insats i Tchad
The aim of this study is to analyze the process of an agenda setting and see how a specific issue came to materialize on the security policy agenda. The empirical goal of the study is to see why Sweden chose to participate in the EU-led operation to Chad, and how that process came to be? The analysis is based upon Kingdon's multiple streams theory (2003) where he distinguishes the process into three streams. Central for his theory is the coupling of these streams and the importance of a policy entrepreneur. I complement Kingdon's theory of policy entrepreneurs by taking inspiration from Hinnfors (1995), Gustavsson (1999) and especially Eriksson (2000) and their analysis of policy change and agenda setting.
Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.
Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.
Att Visualisera Oron : Hotet, subjektet och terrorattentatet i Stockholm 2010
This study examines which socially constructed threats and subjects of security existed during the aftermath of the terrorist attacks in Stockholm 2010. With ideas of identity and difference as a starting point the theoretical framework is then developed with ideas from the new critical security studies including key subjects such as attributes, risk, imaging and visualisation. The study will be executed with the use of a discourse analysis approach using newspaper articles and chronicles as the principal empirical material. The analysis will then follow two separate themes. Firstly, the different threats and subjects of security will be deduced, and also, how these social constructions inevitably create each other and require each other to continue existing.
Försäkringskassan- effektiv och/eller rättssäker?
The public administration and its officials have a number of values which they have to relate to in their work. The values are a set of democratic and economic values.This study?s purpose is to examine how the officials at the National Insurance Office in Sweden give priority to these values. The study is performed by interviews with officials at two insurance offices.The study shows that the officials in a high degree value the democratic values legal security and public ethics. In turn they experience that productivity, which is an economic value, is being promoted in a high degree from the management.
Den svenska neutralitetsdebatten 1988-1992
Starting at the end of the Cold War, this publication assesses the impact of the upheavals in Eastern Europe and the atrophic Soviet Union on the Swedish doctrine of neutrality with its 200 year old tradition. Since the end of world war two the proximity of the Soviet Union had constituted the major impetus for upholding a position of neutrality and as this vanished a pressure for change was created. This essay works with a theoretical framework delineated by Kjell Goldmann and under this disposition, the Swedish tradition of neutrality, governmental positions, opposition and four major influential newspapers are studied. The standings of each variable are canvassed in an attempt to explain the development of Swedish security policy during the crucial years of 1988-1992..
The Capital Structure Puzzle of SME's - Evidence from the Swedish Security Industry
The purpose of this thesis is to ascertain the main determinable factors of Swedish SMEs capital structure decisions and to investigate whether existing capital structure theories are applicable on Swedish SME financing. We have used panel data to run regressions of various capital structure determinants on three measures of capital structure; short- term debt, long-term debt and total debt. We found that growth opportunities, profitability and age are the most important capitalstructures determinants for our sample. Firm size shows a small explanatory result but the effective tax rate and the asset tangibility do not seem to explain the capital structure at all. Thematurity matching principle is considered significant..
Att nyttja marken 30 meter från järnvägen : hur platser, syften och miljö vävs samman
The purpose of this work is to raise ideas and interest for land that is very much forgotten,unused and neglected in terms of maintenance and usability. Railroads are often seen as adirty and loud intrusion in the landscape and therefore cities turn their backs on them. Theland around railroads is not considered useful despite its often central location and scrublandis common in these areas.The starting point of this work is the restrictions and possibilities linked to the land withinthe security distance 30 meters from the railroad center. Within this security distance thereare numerous limitations and regulations due to the nature of railroad use. These limitationsare counted for in the initial chapter and lay the foundation for the rest of the work.
En diktaturs väg in i Informationssamhället Kina och World Summit on the Information Society
This masters thesis investigates the relation between China and the Information Society as it is manifested in the UN conference the World Summit on the Information Society WSIS. The first phase of this two-phase conference took place in Geneva 10-12 December 2003, with two documents, Declaration of principles DP and Plan of action PA, as main results. The information policy is central to an authoritarian rule in its efforts to keep control over the national identity. The thesis investigates the impact that the information revolution and Internet might have on the Chinese national identity through the acceptance of DP and PA in various aspects. With the use of the information science theories by Manuel Castells and Frank Webster, the vision of WSIS was compared with the Chinese information policy.
Föräldramedverkan vid utförande av vårdåtgärder i hemmet efter instruktion/utbildning från sjuksköterska : Föräldrars och sjuksköterskors upplevelser
Introduction: Parental involvement is becoming increasingly common in the paediatric health care. Parental participation at home means that parents receive instruction by nursing staff in order to perform a caregiving procedure at home.Aim: To explore parents' feelings about performing caregiving procedures on their child at home, and their experience of instruction about these, and to explore nurses? experiences of their instruction to parents.Method: A descriptive quantitative and qualitative design using questionnaires with statements to be responded by nurses and parents according to scales graded 1-10. The study was carried out during the autumn of 2009 at a pediatric unit in the University Hospital in Uppsala.Results: Ten completed questionnaires from the nursing staff and ten from parents were obtained. The mean assessment of parents' perceived safety and security, and their perception that their questions had been answered ranged between 8,6 and 9,2.
Flexibiliteten på arbetsmarknaden : Ett genuint utbyte mellan bemanningsbranschen och dess anställda?
The flexibility of the labour market is considered as an instrument for increasing economic growth.Therefore has the use of flexible employment, also called atypical employment, increased. The atypical employment is characterized by insecurity in comparison with a traditional permanent full- time employment. One of the most common atypical employments is the manning employment, which is insecure whether it is permanent or not. The insecurity in the industry is based on insecure income, unpredictable working hours and poor psychosocial work environment.In order to encourage a continued increase of flexibility in the labour market while the need for security for staffing employees would be satisfied was Directive 2008:104 adopted. A certain amount of security has been achieved.
Inloggning : Lösenordskryptering och Brute force attack
This report is the result of a sub-project of a larger project to create a platform formathematical education. The sub-project focuses on authentication with associ-ated security, where security is emphasized. The project environment is Java EE 6where GlassFish 4.0 acts as the server. The project has been divided into threeparts; password encryption, Java EE authentication and brute force attack. Thepassword encryption part focuses on examining different hash functions executionspeed, the result shows that none of the examined hash algorithms is suitable fordirect use.
Bring Your Own Device : Ur ett säkerhetsperspektiv
Syftet med denna studie är att identifiera hot, risker och konsekvenser kopplade till BYOD samt undersöka hur dessa kan lösas. BYOD är idag något som införs i allt större utsträckning hos olika företag världen över. Många är intresserade av alla möjligheter det kan frambringa, dock blundar allt för många för alla de olika hot och risker det samtidigt kan medföra. Utöver det tar vi i denna studie även upp hur man kan skriva en säkerhetspolicy kopplad till området BYOD. För att komma fram till våra slutsatser har vi förutom den teori vi samlat in fått hjälp av Jan-Olof Andersson en av Sveriges främsta IT-säkerhetsexperter med att skapa en riskanalys och en arkitekturbild.
Bankers identifieringsmetoder : Nu och i framtiden
Keywords: ID-method, internet, security, digitzing, bank Background: The digitizing of our society continues to grow and more parts of our lives is spent on the internet. The banks are one of the institutions that is at the forefront of this development since they established themselves on a early basis. The banks meeting points have since this establishment moved from the regular bank office out on the internet. A problem that has occurred during this transfer is the possibility to positive ID a customer in a virtual world. It is essential to offer the customer methods to identify themselves that are both safe and easy to use.