• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys

Bertilsson, Linus, Granvik, Jim January 2014 (has links)
IT-användandet bland Sveriges företag är mycket stort och utvecklingen går snabbt framåt. Samtidigt som teknologin skapar möjligheter så skapar den även hot mot företagen själva. Dessa hotbilder glöms ofta bort och konsekvenserna kan bli att känslig information hamnar i fel händer. Undersökningen handlar om anställdas kunskap om den egna verskamhetens IT-säkerhetspolicy. I undersökningen granskas och jämförs även IT-säkerhetspolicys från ett mindre företag och en större kommunal organisation. Som metod har enkäter och intervjuer använts. Resultatet visar att kunskapen hos de anställda kring den egna IT-säkerhetspolicyn är varierande och att de båda policyerna ser mycket olika ut. En IT-säkerhetspolicy bör inte anses som en problemlösare i sig, utan användandet kan även ge nackdelar. Den kan ge stöd och tydlighet i arbetet och kan underlätta i beslutsfattande situationer och öka säkerheten i företaget. Det räcker dock inte med att ha en detaljrik och heltäckande IT-säkerhetspolicy, om de anställda inte känner till att den finns eller inte vet vad den innehåller. En IT-säkerhetspolicy bör vara ett levande dokument som tas upp för gemensam diskussion och revideras med jämna mellanrum. Nyckelord: IT-strategi, IT-säkerhetspolicy, organisation, enkät, intervju.
2

Strong user authentication mechanisms / Starka användarverifieringsmekanismer

Haraldsson, Emil January 2005 (has links)
<p>For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. </p><p>Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design. </p><p>Strong user authentication mechanisms enforce the use of two-factor authentication or more. The combinations implemented rely on knowledge, possession and sometimes logical-location. </p><p>A user authentication system has been implemented using leading industrial products as building blocks glued together with security analysis, programming and usability research. </p><p>The thesis is divided into two parts, the first part giving the theoretical background of cryptography, authentication theory and protocols needed for the understanding of the second part, providing security analysis, blueprints, and detailed discussions on the implemented system. </p><p>Conclusions have been drawn regarding the implemented system and its context as well as from strict theoretical reasoning regarding the authentication field in general. Conclusions include: </p><p>· The unsuitability of remote authentication using biometrics</p><p> · The critical importance of client security in remote authentication</p><p> · The importance of a modular structure for the security of complex network-based systems</p>
3

Strong user authentication mechanisms / Starka användarverifieringsmekanismer

Haraldsson, Emil January 2005 (has links)
For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design. Strong user authentication mechanisms enforce the use of two-factor authentication or more. The combinations implemented rely on knowledge, possession and sometimes logical-location. A user authentication system has been implemented using leading industrial products as building blocks glued together with security analysis, programming and usability research. The thesis is divided into two parts, the first part giving the theoretical background of cryptography, authentication theory and protocols needed for the understanding of the second part, providing security analysis, blueprints, and detailed discussions on the implemented system. Conclusions have been drawn regarding the implemented system and its context as well as from strict theoretical reasoning regarding the authentication field in general. Conclusions include: · The unsuitability of remote authentication using biometrics · The critical importance of client security in remote authentication · The importance of a modular structure for the security of complex network-based systems

Page generated in 0.0453 seconds