
Sökresultat:
18264 Uppsatser om Information Security - Sida 7 av 1218
Personuppgifteshantering och identifiering inom myndighet, skola och förtag
The authors of this thesis have studied the handling of personal information in various kinds of organizations, because the perception is that the knowledge in this area is weak relative to the weight of the subject.The purpose of this paper has been partly to shed light on how knowledge of this area in the organizations that we have visited during the study but also to answer questions about handling, knowledge and security, and identification of individuals in different systems. What kind of problems the processing of these data creates and why these problems occur.In the beginning of our study we understood the importance of using the correct identifier and therefore chose also to examine what the various identifiers used by the organizations and why they chose these particular identifiers.In the qualitative analysis, Datainspektionen´s general rules and advice has been used as a basis together with the laws applicable to the organizations to get a good picture of how management of personal information is in these organizations.What we have found in this paper is that knowledge about how personal data is handled and what laws and rules are saying is very much dependent on how central the information is to these organization's activities. The police use so many different types of records for their organization to function well and they have very good knowledge of laws and regulations. In contrast, schools that do not handle as much of personal data themselves nor have the same knowledge among staff and do not have enough resources to cope with keeping the same knowledge base as the police. This is something that applies to all types of handling, depending on how important the information is for the organization, the better the security and knowledge in handling the data is..
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Distriktssköterskans möte med föräldrar som ställer sig tveksamma till MPR-vaccination
Vaccination as a part of the preventative public health project has for many years been one of the important tasks of the children's health care. The vaccination program has been adjusted to current research and the health situation in the country. Having their children vaccinated is not something obvious for all parents, though. Especially the vaccination against measles, whooping cough and German measles have been questioned. The purpose of this literature study was to investigate the reasons for the resistance to vaccinate and to illuminate the security creating advice of the nurse at the public health centre.
Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.
During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Framtagning av en förebyggande åtgärd mot kriminalitet vid lastbilstransporter
Boberg at Scania CV AB. The purpose was to investigate the technical and customer oriented possibilities for the development of a transport security measure against cargo crime, which is a growing problem in Europe. The main goal was to develop a concept that is possible to implement in the Scania CV AB Fleet Management System. Another goal was to develop a security model that will be used as a tool during Scania CV AB?s future development projects of transport security concepts.The work was divided into three main parts: a background study, handling cargo crime, transport security Scania CV AB trucks and market analysis, a stakeholder investigation including a questionnaire and interviews, and a concept development session.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
En studie av zero knowledge-identifikationsprotokoll för smarta kort
Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.
Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.
Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik
Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.
Parental experiences when children are undergoing emergency surgery/Föräldrars upplevelser i samband med att deras barn genomgår en akut operation
When a child is hospitalized, it is usually more than one person who needs attention ? i.e. the child as well as its parents. The emergency ward environment and surgery rooms are unfamiliar and the parents feel anxious, insecure and uncertain about how to act. They are expected to participate in the child?s care, cope with their own anxiety and simultaneously convey a sense of security and stability to the child.
Snabb och säker roaming i WLAN
This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).
Staters förhållningssätt till Human Security i teori och praktik : En jämförande fallstudie om kriterierna för verkställighetshinder till Syrien hos Sveriges och Norges migrationsverk
Den här uppsatsen handlar om staters förhållningssätt till human security i teori och praktik. Syftet med uppsatsen har varit att undersöka om den kanadensiska definitionen av human security används som referensobjekt i policydokument från Norges och Sveriges nuvarande regeringar samt hos ländernas kriterier för verkställighetshinder av syriska medborgare. Uppsatsens metod är en jämförande fallstudie där verkställighetshinder och utvalda policydokument utgör analysenheterna. För att analysera dokument och ställningstaganden används kvalitativ textanalys.Fallstudien visar att båda länderna ser sig själva som föregångsländer inom human security, bland annat genom skapandet av strategier och handlingsplaner. Vidare visar studien att migrationsverken har olika tillvägagångsätt för verkställighetshinder till Syrien.