Sökresultat:
1176 Uppsatser om Security sectors - Sida 8 av 79
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Yrkeskompetens inom offentlig- och privat sektor
Title:Professional skills in public and private sectors Date:2011-05-18 Authors:Zinajda Avdic & Binasa Jasarevic Tutor:Viktorija Kalonaityte Examiner:Richard Nakamura Key words:Competence, professional, public sector and private sector. Thesis purpose:To find out what factors are behind the company and the authority identifies their training needs, what methods they use in the evaluation of outcomes can be integrated into the organization.Method:A qualitative study with a hermeneutic approach and an abduction approach. Theory:The theory depends substances skills, skills needs and skills assessment. Empirical data:Data collected through two interview people on the two public sectors authorities, and two companies in the private sector.Conclusion:We found that organizations put a lot of time and resources to develop, identify and plan professional skills through internal and external courses. The differences between them are determined not by the fact that they are in the public sector or the private, but from organization to organization.
Sociala medier : Arbetsgivares möjligheter skydda sig mot vad arbetstagare skriver i sociala medier
The main purpose of this essay is to investigate the legal position for employers concerning protection against what employees can express about one?s employer in social media.It may regard dissatisfaction concerning employment, tort or so-called whistleblowing. The spread through social media may be comprehensive and thus cause more damage to the employer.Employees within the public sector as well as in the private are protected by the liberty of speech, which is constitutional, even the protection of sources or the right to criticize can offer some protection. This gives the employees the possibility to widely express themselves in private social media as long as it can?t be classified as a violation, which per se is very rare.However, certain differences between the both sectors will be pointed out.There are still no constitutional rights regarding social media, but a grey area has emerged concerning the legal position.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
DDoS : -Vad är det och går det att skydda sig?
This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..
Att lära sig relationskompetens och ledarkompetens : En studie av grundlärarutbildningens utbildningsplaner och kursplaner när det gäller relationskompetens och ledarkompetens
The main purpose of this essay is to investigate the legal position for employers concerning protection against what employees can express about one?s employer in social media.It may regard dissatisfaction concerning employment, tort or so-called whistleblowing. The spread through social media may be comprehensive and thus cause more damage to the employer.Employees within the public sector as well as in the private are protected by the liberty of speech, which is constitutional, even the protection of sources or the right to criticize can offer some protection. This gives the employees the possibility to widely express themselves in private social media as long as it can?t be classified as a violation, which per se is very rare.However, certain differences between the both sectors will be pointed out.There are still no constitutional rights regarding social media, but a grey area has emerged concerning the legal position.
Återfall i brott
Problem Are there any abnormal changes in the parent company's share price at the news of a spin?off.ObjectiveThe main purpose of the study is to investigate how the news of a spin-off affects the parent company's share price. In other words if the news of the Spin-off gives an abnormal return on the Stockholm Stock Exchange during the specific period of 1998?2008. In addressing this, the paper will also investigate the following sub sections: are there any differences in the abnormal returns in various sectors and what the reasons to perform a spin?off in the Swedish market are.MethodAn event study in which market data is used to measure specific events? impact on the value of the company and on the effects on the stock market.
WHITE HOUSE/GREEN HOUSE - En processpårande undersökning av klimatfrågan i USA
This thesis examines the process of securitization of the environmental issue in the United States. By using the theories of sectoral security and securitization by Barry Buzan and Ole Waever, commonly known as the Copenhagen school we go beyond the traditional security frames and examine where the environmental issue in the United States stand today within the securitization spectrum. The securitizing spectrum includes three levels in which an issue can be place: non-politicised, politicised and securitized.The problem, which we wish to address, is if there is a movement of the environmental issue in the United States towards becoming a securitized issue. In the light of these circumstances we also wish to explore who is behind the movement and also find out where the issue stand today. We do believe that Al Gore is a securitizing actor and examine his role in the movement of the environmental issueWe have come to the conclusion that there is an ongoing process of securitization in which the environmental issue have moved from being politicised to becoming securitized..