Sökresultat:
18580 Uppsatser om Information security governance - Sida 7 av 1239
Säkerhetsutvärdering certifikatserver i stället för aktiva kort
Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
Bolagskoder- en jämförande utredning av nationella och internationella direktiv i Sverige och England
Denna uppsats bygger på fyra grundstenar; Svensk kod för bolagsstyrning, Combined Code on Corporate Governance, riktlinjer från OECD, EU:s rekommendationer. För att skapa förståelse för dessa olika regelverk samt möjliggöra en analys, har teorin om Agent och Principal, samt den om Corporate Governance använts. Förutom studier av regelverk har diverse intervjuer genomförts med svenska och engelska börsnoterade företag som lyder under bolagskoderna, samt även intervjuer med revisionsföretag. Dessa har fungerat som informationskällor, referensramar, och underlag för analys och slutsatser. Det ges även sammanfattningar av Svensk kod för bolagsstyrning, samt för Combined Code on Corporate Governance, en redogörelse för riktlinjerna publicerade av OECD och EU:s rekommendationer.
peer2peer - hur dyrt är gratis?
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas
med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas
spyware alternativt adware, misstänks för att samla in personlig information,
så som e-mailadresser och lösenord. Det föreligger en risk att informationen
sedan säljs vidare eller används för att exempelvis rikta reklam....
Svensk kod för bolagsstyrning : Vem finner nytta med den?
Master thesis in business administration, School of business administration, Linnaeus University, accounting, 4FE03E, Spring 2011.Authors: Linda Åslund and Shirin Yousef.Supervisor: Professor Sven-Olof Yrjö CollinExaminer: Christopher von KochTitle: The Swedish code of good governance ? Who finds it useful? Background: Corporate governance has emerged to maintain the stockholders interests in corporations where the owners are separated from control in order to create confidence in the corporations. In 2005 the Swedish code of good governance emerged to prevent in part additional corporate scandals from happening and to make sure that the board is acting in the interest of the owners. The code is a complement to the Swedish Companies Act since it has a more strict demand in certain areas but it gives the companies a possibility to deviate by either complying or explaining their actions.Purpose: The purpose with this thesis is to examine who finds the Swedish code of good governance useful.Method: The research method of this survey is quantitative where the purpose is to investigate deviations in the companies? corporate governance reports.
Poverty Reduction Strategy Papers och deltagande
The failure of Structural Adjustment Programs and its neoliberal policies to effectively reduce poverty have led to the creation of Poverty Reduction Strategy Paper (PRSP) by The World Bank and International Monetary Fund. PRSP, connected to both the Comprehensive Development Strategy and the HIPC initiative, are built on the notion of national ownership and stakeholder participation and thereby expand potential conditionality to include matters of governance. This thesis examines the evolution of PRSP and how the process of participation affects national governance structures. By analyzing the role of rules and norms within the World Bank and IMF from a historical point of view the thesis explains why the participation process has developed the way it has. It concludes that neoliberal norms, still at heart within the World Bank and IMF, have an impact on the process of participation within nation states and thereby its governance structure.
Derivativ talan och Corporate Governance. En komparativ studie ur ett rättsekonomiskt perspektiv
The world is getting smaller. Global markets, political processes and communication technology bring people together. Even though many of these processes are dynamic and constructive, they have also resulted in a need for better and more effective ways of international conflict resolution. This thesis investigates central issues connected to the concept of humanitarian interventions in relation to current and future legislation of the European Union. The overall question is whether the rapid globalization process has resulted in a change of international law towards more liberal view where authorization of the security council is not always needed? And, if there has actually been such a liberalization, how does that affect the legal possibilities for the European Union to carry out armed operations without the consent of the global community?The conclusion of the thesis is that international law has been modified mainly in two aspects: First, the concept of sovereignty is no longer seen merely as a right of the nation, but also as a responsibility.
Demokratisering av WTO
Allteftersom makten i viss mån har förskjutits från "government" till "governance", bör det följaktligen medföra ökat krav på demokrati inom governance. När internationella organisationer med tiden får mer makt och inflytande i olika delar av samhället bör dessa också ta mer ansvar för att främja demokratin. Detta eftersom demokrati anses vara grundpelaren i "moderna" samhällen. I viss mån ställer världssamfundet krav på att nationer ska gå mot en utveckling av demokrati. Varför ställs inte samma krav på governance, som börjar bli allt viktigare i den globala värld vi lever i.
Datasäkerhet : Hur man skyddar sig mot interna hot
As the companies of today are good at protecting themselves against external threats, but are having problems with internal threats, we focused on how information can be protected from ending up in the wrong hands. First and foremost to protect information from employees who might steal it and sell it to another company. Since the security investments needed are connected to the financial costs of implementing them we have tried to create a balance between the investments needed and the cost of implementing them. The different kinds of protection needed are first and foremost protection to make data less accessable, passwords and traceability. While it is hard for us to estimate the amount of money a company lose by the hour when the production stands still, we have not been able to use any of the excising models to calculate the profit of installing countermeasures.
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
Requirement Specification for Information Security to Health Systems, Case Study : IMIS
During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Säkerhetsmedvetenhet hos hemanvändare
IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter och prylar på en daglig basis. Arbetet tas med hem i en större grad med hjälp av laptops, VPN och molnmöjligheter. Mail kan tas emot i princip var och närsomhelst på dygnet. Men hur bra är säkerheten? På arbetsplatsen hanteras mycket av IT-säkerheten och ansvaret för den ofta av erfarna och dedikerade anställda, men hur ser det ut hemma där användaren själv har ansvaret för sin IT-säkerhet?I denna studie analyseras och identifieras risker och problem vid hantering av olika aktiviteter relaterade till IT-säkerhet i hemmet.