Sök:

Sökresultat:

18625 Uppsatser om Information security governance - Sida 24 av 1242

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är.

Distribution av känslig data

Information Technology (IT) makes it possible to electronically distribute data between actorswho are in geographically diverse areas. Nowadays, information is sent less frequently throughtraditional correspondence in favor of faster electronic equivalents via the internet.Despite effective IT environmentand secure encryption techniques choose some actors to sendinformation through physical delivery. This phenomenon occurs in those working withconfidential information as it is handled by a number of rules and safety regulations.Based on a set of rules and requirements, we have looked over the possibility of sending sensitiveinformation electronically over the internet. The aim was to find general guidelines for howcompanies and organizations should manage and send sensitive information over insecurenetworks. This led us to our research question: How can information be exchanged betweenactors in geographically diverse areas be categorized and encrypted so that it can be transportedover the internet without security or integrity deficiencies?To answer the question, there was a case study at a defense company.

Ungdomars medvetenhet om säkerhetsrisker med bankverktyg

According to Nosti (2012) banks target youths to find new customers by giving them special offers such as debit cards from a relatively early age. However, Moschis and Churchill (1979) point out that age can affect the level of knowledge in the consumer. Therefore, this essay focuses on youths as consumers. Specifically, youths? awareness of security risks in using bank tools such as debit cards or internet banks was studied.

Trygghetskänslan hos mammor som går på tidig hemgång efter förlossningen

Vårdtiden för mammor efter förlossningen har minskat markant de sista decennierna. Det är därför av vikt att undersöka hur nyblivna mammor upplever den första tiden efter de har fött barn. Syftet med studien var att undersöka känslan av trygghet som mammor, med tidig hemgång, kände under den första veckan efter förlossningen. Metod: Enkäten Parents Postnatal Sense of Security (PPSS) med 18 frågor plus tre tilläggsfrågor användes. Enkäten skickades till 100 nyförlösta svensktalande mammor med normala förlossningar och tidigt hemgång.

HAVECA-modellen : En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Valberedning och tillsättning av styrelse enligt Svensk kod för bolagsstyrning: En studie av könsfördelning ur ett institutionellt perspektiv

Since July 2005 the major companies listed on the Swedish stock exchanges are required to apply the Swedish Code of Corporate Governance. The code states that companies shall have a nomination committee responsible for nominating new board candidates and seek to obtain gender equality in the Board of Directors. This paper examines the trend of board as well as nomination committee composition among Sweden's 60 largest publicly traded companies between 2005 and 2008. Our overall finding is that neither the board nor the nomination committee composition has changed to a notable extent during the period and that the share of newly appointed female board members has actually decreased. However, the trends vary between different sectors.

Samverkan mellan kommun och näringsliv i en medelstor stad : En fallstudie av satsningen "100 nya Karlstadjobb"

Samhällets styrformer har genomgått en förändring och kännetecknas idag av en komplexitet som innebär att flera olika aktörer är inblandade, där samarbeten över de privatoffentliga gränserna har blivit allt vanligare för att lösa samhällsproblem som traditionellt sett ålegat staten. År 2013 tog Kommunfullmäktige i Karlstad beslut att genomföra en arbetsmarknadspolitisk åtgärd i form av satsningen ?100 nya Karlstadjobb?. Beslutet innebar att kommunen tillsammans med det privata näringslivet skulle ta fram 100 nya jobb till personer som stod långt ifrån arbetsmarknaden. Den 31 december 2014 avslutades satsnigen och utvärderades av en samordnare på kommunen.

Behöver tillväxten en stad? Om Dublin som politisk arena, aktör och tillväxtmotor

This thesis intends to examine the role of the city, Dublin, in the Irish economic growth during the 1990s. It is a case study where Dublin is compared with current theories on post modern cities as growth machines and increasingly prominent actors in the global context. The study has an interdisciplinary approach but focuses on political science issues such as power distribution, global-local governance and local political organisation. It is a theory driven study that also intends to add aspects to the understanding of the cities of our time. I argue that Dublin has faced a lot of changes during the last decades in accordance with the post modern city.

Hembudsklausuler i aktieägaravtal

Since the 9/11-attacks several nations have been confronted with a new international threat, its nature traces back to the political- and religious- radical movements of the 20th century Cold War. Ever since, various states have been under threat by terrorist organizations around the world due to mainly participating in worldwide counter-terrorist interventions created by western alliances. In Sweden, amongst other countries, the state took security-precautions that would imply total control of information throughout the territorial borders. The assigned proposition was accepted by the Swedish parliament in June 18th 2008, after this date wild spread criticism was still in effect ever since the Swedish government first publicly announced the proposition in May 8th 2007. This study emphasizes on understanding why the Swedish government chose to present this proposition to parliament, in order to complete this task the study will present the motives and the alleged threats that were the core of the proposition and its value-maximizing goal of creating a new surface for Swedish homeland security.

Lingvistisk knäckning av lösenordsfraser

För att minnas långa lösenord är det inte ovanligt att användare rekommenderas att skapa en mening som sedan sätts ihop till ett långt lösenord, en lösenordsfras.Informationsteoretiskt sett är dock ett språk väldigt begränsat och förutsägbart, varför enligt Shannons definition av informationsteori en språkriktig lösenordsfras bör vara relativt lätt att knäcka.Detta arbete riktar in sig på knäckning av språkriktiga lösenordsfraser, dels i syfte att avgöra i vilken grad det är tillrådligt att basera en lösenordspolicy på lösenordsfraser för skydd av data, dels för att allmänt tillgängliga effektiva metoder idag saknas för att knäcka så långa lösenord.Inom arbetet genererades fraser för vidare användning av tillgängliga knäckningsprogram, och språket i fraserna modelleras med hjälp av en Markov-process. I denna process byggs fraserna upp genom att det används antal observerade förekomster av följder av bokstäver eller ord i en källtext, så kallade n-gram, för att avgöra möjliga/troliga nästkommande bokstav/ord i fraserna.Arbetet visar att genom att skapa modeller över språket kan språkriktiga lösenordsfraser knäckas på ett praktiskt användbart sätt jämfört med uttömmande sökning..

En fallstudie inom en organisation av Security Operations Center (SOC): Utmaningar och utforskning av Agil och Traditionell metodik : A Case Study in a Security Operations Center (SOC) Organization: Challenges and exploration of Agile and Traditional Meth

This study focuses on a specific organization of a Security Operations Center (SOC) as a case studyto first identify specific challenges related to the work process, preceding with identifying whichprinciples from various process models, such as agile and traditional methodologies from softwaredevelopment companies, can be implemented. Initially, the study presents relevant research on agile and traditional process models as well asresearch on SOC. Subsequently, six semi-structured interviews are planned and conducted withemployees within a specific SOC-type organization to identify the current work process and thechallenges affecting the organization?s work process. The results of this study indicate a description of the current work process in the organization aswell as a variety of challenges related to technical and organizational issues.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Safe retrieval of nutrients to improve food security

Safe retrieval of nutrients from human excreta to fertilize crops in order to gain adequate yields will increase food security and sustainability in agriculture areas with nutrient-poor fields. Safe and nutritious food will meet the dietary needs of the individual which promotes public health and the ability of an active life. Human excreta should be considered as a resource instead of being assumed as waste. Human faeces and urine is excellent fertilizers which may close the nutrient loop if utilized properly. However, sanitation of the excreta is required to prevent disease transmission by reducing the content of gastrointestinal pathogens such as bacteria, viruses and parasites. The objective of this study was to in small scale evaluate the sanitation in a combined liquid compost and urea treatment by monitor the inactivation of bacteria and viruses at the combination three start temperatures, 45, 40 and 35 °C, and three additions of urea, 0.5, 0.75 and 1 % and reference, 0 % urea addition.

Svensk Kod för bolagsstyrning : Intern kontroll avseende bolagens finansiella rapportering

The Swedish Code for Corporate Governance was introduced on July 1, 2005. All companies then listed at OM Stockholmsbörsen A-list and those on the O-list with a market value of more than three billion SKr must implement the rules in the Code. The Code includes rules for corporate governance as a complement to the legislation. The Code is based on the principle comply or explain. This means that the companies are aloud to diverge from the rules if they explain why.

<- Föregående sida 24 Nästa sida ->