• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 5
  • 1
  • Tagged with
  • 25
  • 25
  • 7
  • 7
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter

Olsson, Per January 2013 (has links)
Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments? This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops. The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing.
22

Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter

Juhlin, Pär January 2013 (has links)
Smarttelefoner har blivit vanligare som affärsverktyg inom arbetslivet. Med sina många funktioner och stora flexibilitet har smarttelefonen stormat affärsvärlden och kommit att bli ett alternativ eller komplement till den bärbara datorn. Allt eftersom smarttelefoners popularitet har ökat, har även företagens intresse att investera i denna nya teknik vuxit, men har säkerheten följt med i denna snabba utveckling? Denna studies syfte är att genomföra en undersökning för att se ifall företag inom IT-branschen har samma säkerhetsmedvetande för smarttelefoner som för bärbara datorer.   Studien visar att företag har ett större säkerhetsmedvetande och högre säkerhetskrav för bärbara datorer än smarttelefoner. Samtidigt är både slutanvändarna och företagsledningen väl medvetna om de risker och hot som smarttelefonen ställs inför. / Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?   This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.   The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing.
23

Penetration Testing Ten Popular Swedish Android Applications

Astély, Alexander, Ekroth, Johan January 2022 (has links)
As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. Therefore, it is crucial that the applications are secure against a various array of cybersecurity threats. This includes following data protection standards to secure the IT infrastructure surrounding the application from intrusion. This thesis aims to provide a general overview of the security for ten popular Android applications that are aimed at the Swedish Android user base. To evaluate the security of the applications, the process of ”penetration testing” was used to try find and exploit vulnerabilities. The results of the penetration testing process yielded no proper vulnerabilities in terms of being specific for the Android application software. Noticeable findings during the testing were business logic errors, meaning that they do not enable for further hacking and software exploitation. Our analysis of the results concluded that the main causes for the lack of vulnerabilities found likely has to do with rigorous software testing before release and the security practices in place when development applications of the scale tested. / I takt med att allt fler tjänster som tidigare genomförts fysiskt nu genomförs via mobilapplikationer har säkerheten i utvecklingsprocessen fått en allt viktigare roll. Dessa mobilapplikationer kan hantera känslig information för användaren som till exempel betalningsinformation, hälsoinformation och annan information som kan vara av intresse för illvilliga aktörer. På grund av detta är det avgörande att applikationerna är säkra från en mängd olika cyberhot. Samt att följa dataskyddsstandarder för skydda IT-infrastrukturen kring applikationerna från intrång. Denna uppsats har som avsikt att ge en generell bild av säkerheten för tio populära Androidapplikationer som är riktade mot svenska användare. För att utvärdera säkerheten av en applikationerna användes en process kallad penetrationstestning, som användes för att försöka hitta och utnyttja sårbarheter. Resultatet av penetrationstesten var att inga riktiga sårbarheter kunde hittas som var specifika för Androidapplikationernas mjukvara. Noterbara fynd under penetrationstestningen var svagheter i företagslogik, vilket i detta sammanhang är svagheter som inte möjliggör för vidare intrång. Vår slutsats efter att analyserat vårt resultat är att de huvudsakliga anledningarna till frånvaron av svagheter troligtvis har med den rigorösa testningen som sker före publicering och de säkerhetsrutiner som åtföljs under utvecklingen av applikationer av denna storlek.
24

Profile Analysis of Mobile Application Security

Olunuga, Adetunji A. 01 January 2018 (has links)
ABSTRACT This thesis conducts profile analysis on the mobile application security using peer-review articles that were published from 2010 to 2018. From the analysis, we will identify prolific authors, intuitions, and geographic regions as well as the topics addressed by the articles. The profile analysis will reveal most frequently used research methods, research approaches (quantitative, qualitative and mixed), and theories used to study the field. This thesis reveals that none of the researchers have made significant contributions to the field, and researches are not collaborating to solve their research problems. The profile analysis shows that surveys and experiments are the most utilized research methods, and most researchers studied the field at a higher level, i.e., security was the focus of the research but did not go deeper into various aspects of security such as privacy, security vulnerabilities, and mobile application security best practices.
25

Extending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques

Adeka, Muhammad I., Shepherd, Simon J., Abd-Alhameed, Raed January 2013 (has links)
No / Security is a function of the trust that is associated with the active variables in a system. Thus, the human factor being the most critical element in security systems, the security perimeter could be defined in relation to the human trust level. Trust level could be measured via positive identification of the person/device on the other side of the interaction medium, using various authentication schemes; location-based being one of the latest. As for the location-based services, the identity of a customer remains hazy as long as his location is unknown; he virtually remains a ghost in the air, with implications on trust. This paper reviews the various location-based authentication techniques with a focus on the role that GPS could play in optimising this authentication approach. It advocates the urgent need to make all transmission devices GPS-compliant as a way forward, despite the privacy issues that might arise.

Page generated in 0.0704 seconds