Sök:

Sökresultat:

1209 Uppsatser om Security threats. - Sida 2 av 81

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Irans anrikning av uran - Analys av aktörer och säkerhetiseringsprocesser

This theory consuming thesis is concerned with why Iran's uranium enrichment has become a security issue, and will focus on the five most important and involved actors: China, Russia, Iran, the US and the UN. I will do this by using instruments of analysis such as securitization and strategic analysis. With these instruments I will examine different factors, such as deterrence, the action-reaction model and armament. Since, according to my opinion, security matters include more sectors than military I will also examine the political, societal and economic sectors. China and Russia have acted differently compared to the US in this matter and this thesis will highlight the factors that can explain the different actions made by these countries.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

Förebyggande arbete mot våld och hot om våld inom socialtjänsten : En kartläggning av chefers upplevelser

Dealing with threats and violence at the workplace is a reality for many social workers, where a majority of them have to face client oriented incidents at least once during their career. Incidents are most commonly expressed as threats and harassments, but can also take place in the form of physical violence. Looking at the problem from a supervisor perspective, it will affect and possibly damage the specific exposed employee, the workplace as a whole and the clients. Supervisors are the ones responsible for developing workplace enviroments that are satisfyingly safe, for which guidelines can be found in law as well as in an emerging research area. Reasons as to why some people tend to become violent is as complex as reasons as to why some people seem to be more vulnerable or exposed than others. That is why means of preventing threats and violence can not be explained in one single way, but the answer must be sought on several levels.

Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas

Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.

Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet

The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.

Säkerhetstänkande integrerat i systemdesign via formaliserade metoder

Systems development methods mirror different organizational perspectives, and not all methods are formalised, but what they have in common is the purpose of structuring and supporting systems development processes. Which method would be the most suitable may be determined by the systems development context at hand, because every systems development context is unique. Information is a valuable asset in today?s organizations, and it needs to be protected against both internal and external Security threats. In our essay we aspired to find and present suggestions as to how systems developers can include security in the very design based on formalised systems development methods to create systems that are better prepared to meet the security challenges of today.

EU:s grannskapspolitik i Medelhavsregionen : En säkerhetspolitisk analys av Medelhavssamarbetet

AbstractThe thesis investigates how the European Union promotes stability and security in the Mediterranean region. The aim is to analyse the European Union?s security ambitions with Euro-Mediterranean Partnership, the Barcelona Process. An analytical framework with five sectors (military, political, economic, environmental and societal), based on the Copenhagen School?s theories about security sectors and securitization, is used for the analysis.

Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Utvärdering av Falköpings kommuns Informations säkerhet

A student at the Technical University in Jönköping was given an assignment from Falköping municipality. The assignment was to evaluate their IT systems 'users' awareness of information security and even present suggestions for IT-Users to improve their information security within Falköping municipality.Falköping municipality consists today of seven administrations. The target groups for the study of the information security are a pilot group consisting of 30 IT Users and four different managers from various administrations within Falköping Municipality.The purpose of this work is mainly to indicate an understanding of the importance of the information security knowledge among IT Users in Falkopings municipality, mainly those who use their smartphones and tablets for work-related activities.This work aims to answer the following questions:? How wide is the awareness of information security among municipality's IT users?? How can information security improve among the municipality's IT users?Theories that work consists of are mainly what information security is, how it is handled and the threats and risks that may create problems for the municipality, basically when IT Users use their smart phones and tablets.The Work Implementation started with sending surveys to a pilot group of IT- system users and the student even interviewed four general managers working in Falköpings municipality. Both the questionnaires results and interviews results are presented in diagram and text.The result from both surveys and interviews was very positive and it shows that the municipality investigated IT-Users are very aware and have knowledge about information security, when they use their smart phones and tablets.

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

<- Föregående sida 2 Nästa sida ->