Sökresultat:
1555 Uppsatser om Security risks - Sida 5 av 104
Säkerhetsutvärdering certifikatserver i stället för aktiva kort
Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.
Säkra kommunikationskanaler i en distribuerad heterogen miljö
The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Ska vi gå hem till dig, eller hem till mig? Om sexuellt kontaktskapande i nöjesetablissemangsmiljö i Malmö och Lund
Places like nightclubs or pubs are frequently visited in order to find partners for love, sex and relationships. This study examins behavioral patterns and trends among young adults in these environments. A computer-based questionnaire has been implemented on entertainment establishments - two studentclubs, one youth club and three nightclubs - in Malmoe and Lund in southern Sweden. The emprical material contains at most 149 answers, and at least 109. Sex, love and relationships are less important than expected, but are still some of few big reasons for visiting nightclubs.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
Riskhantering i IT-projekt : En kvalitativ studie om arbetsmetoder
Many organizations today work in projects, a method of organizing work to provide a clearer focus on goals and more control of every aspect of the assignment. A project is, simply put, a plan to achieve a specific result. In turn, project management means to use various tools and methods to facilitate and streamline the effort towards achieving the goal with the project.Risk management is the activity that refers to finding, identifying and quantify different types of risks and take appropriate action towards reducing or eliminating these risks to the extent possible. With increased use of projects as a method of working the demands for managing risks better become stronger. The question that this thesis tried to answer was: ?What kind of risks does the IT industry think are linked to their projects and in what way does these companies manage these risks??Among the project leaders interviewed, the authors could see a great variation in lines of thought and values regarding the importance of risk management and how risk management should be handled.
Automatiskt kabelmärkningssystem
Risk management is a key competency that is constantly being researched how it can be improved within project management. The risk management process consists of four major steps: identify risks, assess the risks? significance on the project, evaluate and address the key risks and follow up.The majority of companies seem to neglect certain identified risks, and decide not to mitigate if the risk does not cause adverse effects to the business. To counteract undesirable consequences and help organisations to become more effective at managing risks an initial work has been conducted for a risk repository.The project develops a proposal on the design of a risk repository which aim to effectively support a database implementation. The study includes literature studies which resulted in a relational model for database implementation.
Distriktssköterskans möte med föräldrar som ställer sig tveksamma till MPR-vaccination
Vaccination as a part of the preventative public health project has for many years been one of the important tasks of the children's health care. The vaccination program has been adjusted to current research and the health situation in the country. Having their children vaccinated is not something obvious for all parents, though. Especially the vaccination against measles, whooping cough and German measles have been questioned. The purpose of this literature study was to investigate the reasons for the resistance to vaccinate and to illuminate the security creating advice of the nurse at the public health centre.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Ompositioneringens dolda hot : Riskerna med varumärkesompositioneringar
The purpose with this essay is to study how companies use the repositioning process and identify the risks involved from a business perspective. We have chosen to base our essay on the following research questions:What reasons are there for a company to initiate a repositioning?, What does it mean for companies to implement a repositioning?, What are the risks with a repositioning?We have used a qualitative research method and have chosen to interview six respondents which in various ways are actively working with brand repositioning. Our study has been implemented with and deductive character.The most important conclusion that we observed after implementing our study is that repositioning is a high-risk project. Instead of changing their entire brand image, companies should instead make small changes and revitalize the brand by developing the strength that already exist.
Motiv vid köp av skogsfastigheter : Ur privatpersoners perspektiv
Abstract Over the years the consciousness of risk has grown. It?s hard to influence risks, therefore there are guidelines stating that significant risk must be included in the annual report. This paper is a case study; the purpose was to examine how four Swedish listed companies chose to disclose their internal and external risks. Risk is initially described in general sense and then it figures to what constitutes an economic risk.Through a case study of four Swedish listed companies? annual reports we have, through qualitative methods found how the companies chose to disclosure their risks.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Eskortverksamhet med fokus på försäljning av BDSM-tjänster
The purpose of this study is to examine escort-business with a focus on sales of BDSM-services (Bondage and Discipline, Dominance and Submission, Sadism and Masochism).
The study is based on qualitative interviews with three informants providing BDSM-services, as well as a survey with 96 men who requested domination of escorts (the survey was carried out by an escort in the 1980s). The analysis of this material resulted in the identification of three themes on which the study centers: The personal experiences of the three escorts, the interaction between the escorts and the clients, and the changes over time when it comes to the performance of BDSM-services. The study has a gender perspective with a focus on feminism and queer-theory. The important conclusions are that there are several differences between prostitution having a focus on BDSM-services and other prostitution.