Sök:

Sökresultat:

1873 Uppsatser om Online payment security - Sida 7 av 125

Minderårigt nätpokerspelande : En explorativ studie om minderårigas reflektioner och upplevelser av nätpoker

This study represents seven adolescents? perspective on online poker gambling. The purpose of this study is to analyze and describe adolescents? thoughts and experiences of online poker gambling, thus gaining a deeper knowledge and understanding of how gambling affects youths in their living conditions and in their identity development. This was done by studying the symbolism and meaning that gambling has in these youths every day live and in their identity development.

E-livsmedel 2.0 : En kvalitativ studie av livsmedelsbutikers e-handelssatsningar

In this day and age we carry out our purchases through different channels. We can shop our clothes and computers in a store or online. Nowadays we can even purchase our groceries through the Internet. The biggest retailer chains within groceries in Sweden have established virtual stores online and are distributing the goods in cities throughout the country. This thesis is dedicated to investigating crucial success factors when going about selling groceries online.

Utvärdering av SIEM-produkter

Denna rapport behandlar ett examensarbete med målet att hitta en paketering för resursövervakning i nätverk (NPMD - Network Performance Monitoring & Diagnostics) samt centraliserad logghantering (SIEM - Security Information & Event Management).Arbetet har utförts över fem veckor och bestod av att undersöka vilka produkter som kan vara möjliga att leverera till Ateas kunder genom att ta fram förslag på produkter och sedan utvärdera dessa i en virtuell testmiljö.Efter att två veckor av arbetet passerat beslutades att enbart SIEM-produkter skall utvärderas då vi annars inte kunnat hålla tidsramen på fem veckor. De första två veckorna bestod mestadels av efterforskning av olika produkter baserat på ett antal kriterier.Applikationen ska:? Stödja mallar och regler för Payment Card Industry Data Security Standard (PCI-DSS)? Stödja korrelering av händelser? Ej vara open source eller en hårdvarulösningUnder resterande tre veckor installerades, konfigurerades och utvärderades de produkter som var intressanta för ändamålet. Utvärderingen av produkternas funktioner och egenskaper utfördes i en virtuella miljö. Resultatet av testerna är ett dokument som innehåller information om varje produkts förmågor samt betyg på varje produkt.

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Crescendo Online: en programsvit för kollaborativ musikproduktion

Collaborative music making on the Internet is not a new phenomenon, but no applications have yet caught on with the vast number of laptop and bedroom studio musicians active today. This is strange considering the inherent social and interactive nature of music, especially amongst trends like Web 2.0 where collaboration and user-generated data is key. In this paper I study the problems these applications face, and why they do not have a greater appeal to musicians. With the results I develop and evaluate my own framework, known as Crescendo Online: a multi-user sequencing and modular synthesis environment, intended to pave the way for a new type of online music creation platform..

Har en kortinnehavare skadeståndsansvar vid obehörigt användande av kontokort?

The purpose of this essay is to elucidate if there is a liability to damages for cardholders, in case of unauthorized use of bankcards, in the event a liability for payment, according to 34 § the Swedish Law concerning Consumer Credits, should not be established between card issuer and cardholder. The purpose is also to elucidate if card issuing companies, in the event a liability for payment is established between card issuer and cardholder, have any possibility to get a larger sum than is allowed by 34 § the Swedish Law concerning Consumer Credits, by demanding damages from the cardholder. Finally there is a judgement of how a court could do if it wanted to hold a cardholder liable to damages because of unauthorized use of bankcards..

Kul, spännande, och socialt: online-spelare om livet i "bubblan"

Uppsatsen handlar om varför man spelar online spel, och vilka orsaker det är som gör att man lägger ned så mycket tid på det. Jag har intervjuat nio stycken väldigt erfarna onlinespelare runt om i Sverige. Syftet var att ta reda på varför man spelar onlinespel?.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

WLAN : Oskyddad och okontrollerad datakommunikation

This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv

The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

Det är lätt att falla dit, men svårt att ta sig därifrån : en kunskapsöversikt om orsaker till hemlöshet i Norden

I have conducted a review on four countries in Scandinavia and the goal was to create a better understanding about what has caused homelessness in this countries. The result shows that the causes of homelessness can be explained by a variety of reasons. The most common causes of homelessness were related to mental illness and drug abuse. There where also other causes of homelessness, which was considered normal in Scandinavia. Examples of other causes were eviction, unemployment, housing policy, housing shortage, payment of debts, separations and family problems..

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

<- Föregående sida 7 Nästa sida ->