Sök:

Sökresultat:

18197 Uppsatser om Information Security - Sida 2 av 1214

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Utvärdering av Falköpings kommuns Informations säkerhet

A student at the Technical University in Jönköping was given an assignment from Falköping municipality. The assignment was to evaluate their IT systems 'users' awareness of information security and even present suggestions for IT-Users to improve their information security within Falköping municipality.Falköping municipality consists today of seven administrations. The target groups for the study of the information security are a pilot group consisting of 30 IT Users and four different managers from various administrations within Falköping Municipality.The purpose of this work is mainly to indicate an understanding of the importance of the information security knowledge among IT Users in Falkopings municipality, mainly those who use their smartphones and tablets for work-related activities.This work aims to answer the following questions:? How wide is the awareness of information security among municipality's IT users?? How can information security improve among the municipality's IT users?Theories that work consists of are mainly what information security is, how it is handled and the threats and risks that may create problems for the municipality, basically when IT Users use their smart phones and tablets.The Work Implementation started with sending surveys to a pilot group of IT- system users and the student even interviewed four general managers working in Falköpings municipality. Both the questionnaires results and interviews results are presented in diagram and text.The result from both surveys and interviews was very positive and it shows that the municipality investigated IT-Users are very aware and have knowledge about information security, when they use their smart phones and tablets.

Informationssa?kerhetsanalysers verksamhetsnytta : Utva?rdering och fo?rba?ttringsfo?rslag

The importance of good information security and safety grows larger and larger for each day in the information society of today. This concerns citizens, companies and public authorities. At the Swedish Transport Administration, the operation of an information security and safety process has evolved over the years to guarantee that the public authority can be trusted by its citizens, cooperating companies and other public authorities. This responsibility has been assigned to the Information Security and Safety Department (Informationssa?kerhetsavdelningen, ITsa?).In this thesis the aim is to review to what extent ITsa? achieves any business benefits for the Swedish Transport Administration, and to analyze, streamline and come up with solutions to improve their workflow.

Trygghet och trygghetsskapande i arbetslivet

In this paper we examine what security is to the individual and how the individual creates and maintains security in their work. The purpose of this paper is to study how the creating of security in working life is performed. We conduct six semi-structured qualitative interviews with permanent employees in the private sector and we encode our material using thematic analysis. We analyze our material and illustrate our problem area on the basis of Anthony Giddens's theory of ontological security and give examples of how security and creating of security is performed at the empirical field with previous studies in the research area. Our survey shows that security for the individual at work seems to be about having continuity in everyday life, financial stability, a permanent employment, a challenging and fun job and a family in good health and good living.

Restinformation i elektroniska textdokument

Some word processing programs save information that not all users of the program are aware of. This information consists of a number of things. Example of that is who the writer of the document is, the time it took to write it and where on the computer the document is saved. Text that has been changed or removedcan also be saved. This information is not shown in the program and the user will therefore not be aware of its existence.

"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten

This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.

Synen på Säkerhet och Immigration : Finns det ett samband?

The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..

ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

ISIT-modellen - Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

Internationell fred och säkerhet ur ett genusperspektiv: En diskursiv studie av Säkerhetsrådets resolutioner för kvinnor, fred och säkerhet

The Security Council?s resolution 1325 addressed the major negative impact that armed conflict has on women and children. This in turn complicates the Council?s work on maintaining international peace and security. The resolution therefore highlights women?s rights as participants in peace- and conflict processes.

Mänsklig säkerhet i Sudan- För vem och mot vad?

The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.

När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen

This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.

<- Föregående sida 2 Nästa sida ->