• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 3
  • Tagged with
  • 27
  • 27
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Design and evaluation of anonymity solutions for mobile networks /

Andersson, Christer, January 2007 (has links)
Diss. Karlstad : Karlstads universitet, 2008.
22

Visualising security through computer games : investigating game-based instruction in ICT security : an experimental approach /

Näckros, Kjell, January 2005 (has links)
Diss. Stockholm : Stockholms universitet, 2005.
23

Information security in distributed healthcare : exploring the needs for achieving patient safety and patient privacy /

Åhlfeldt, Rose-Mharie, January 2008 (has links)
Diss. (sammanfattning) Stockholm : Stockholms universitet, 2008.
24

Säkerhetsklassificering av IT-system på Fläkt Woods AB

Bustos, Sebastian, Grek, Niklas January 2006 (has links)
<p>This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:</p><p>• What defines a secure system and how does the company relate to these factors?</p><p>• What are the threats today based on hardware/software, human factors and company routines/policies?</p><p>• What measures should be taken for the organisation to reach a higher level of security for their systems?</p><p>• How do we develop a method for classification of security and what components should it contain?</p><p>• What changes are reasonable and necessary with the respect to the company’s resources?</p><p>The report has been done through interviews and analysis of existing systems on Fläkt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company’s needs, have been compiled to a document. It is a model for guidelines to work with security classification of IT-systems.</p><p>The combination of the method for information and the security classification has been clear through the work on the rapport. The method that has been developed for work with security classification of IT systems can therefore not be used as an isolated occurrence to reach the wanted results but should be integrated with the existing classification of information.</p><p>Our conclusions are reflected by the complexity of the project together with the fact that computer security is a topic that includes all parts in an IT- supported organisation. The analyses have given us a good picture of the threats to an organisation. It has clearly been shown, that much security related problems are based on direct organisational problems such as the lack of resources and requirements of system specific guidelines and policies.</p>
25

Identity and anonymity in ad hoc networks /

Martucci, Leonardo A., January 2009 (has links)
Diss. Karlstad : Karlstads universitet, 2009. / S. 167-188: References.
26

A socio-technical analysis of information systems security assurance : a case study for effective assurance /

Chaula, Job Asheri, January 2006 (has links)
Diss. Stockholm : Stockholms universitet, 2006.
27

Säkerhetsklassificering av IT-system på Fläkt Woods AB

Bustos, Sebastian, Grek, Niklas January 2006 (has links)
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are: • What defines a secure system and how does the company relate to these factors? • What are the threats today based on hardware/software, human factors and company routines/policies? • What measures should be taken for the organisation to reach a higher level of security for their systems? • How do we develop a method for classification of security and what components should it contain? • What changes are reasonable and necessary with the respect to the company’s resources? The report has been done through interviews and analysis of existing systems on Fläkt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company’s needs, have been compiled to a document. It is a model for guidelines to work with security classification of IT-systems. The combination of the method for information and the security classification has been clear through the work on the rapport. The method that has been developed for work with security classification of IT systems can therefore not be used as an isolated occurrence to reach the wanted results but should be integrated with the existing classification of information. Our conclusions are reflected by the complexity of the project together with the fact that computer security is a topic that includes all parts in an IT- supported organisation. The analyses have given us a good picture of the threats to an organisation. It has clearly been shown, that much security related problems are based on direct organisational problems such as the lack of resources and requirements of system specific guidelines and policies.

Page generated in 0.033 seconds