Essays about: "Auktorisering"

Showing result 6 - 10 of 11 essays containing the word Auktorisering.

  1. 6. Assessing the Security of Android Dating Apps

    University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)

    Author : Hampus Hauffman; Adam Meyer; [2020]
    Keywords : ;

    Abstract : Abstract Dating apps are continuously becoming a larger part of the social media market.Like any social media app, dating apps utilize a large amount of personaldata. This thesis analyzes two dating apps and how they handle personal informationfrom a security and privacy standpoint. READ MORE

  2. 7. An Internet of Things Software and Firmware Update Architecture Based on the SUIT Specification

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Simon Carlson; [2019]
    Keywords : IoT; industrial IoT; security; Contiki-NG; embedded systems; software updates; IoT; industriell IoT; säkerhet; Contiki-NG; inbyggda system; mjukvaruuppdateringar;

    Abstract : As society becomes more digitalized, cyberattacks are increasingly common and severe. Security in the Internet of Things (IoT) is essential, and IoT devices must be updated to patch vulnerabilities. READ MORE

  3. 8. Client pressure, does it exist, in which form and what is done to prevent it?

    University essay from KTH/Fastigheter och byggande

    Author : Elin Moström; Lukas Theander; [2016]
    Keywords : Client pressure; valuation; real estate appraisal; market value; authorization of valuers; Kundpress; värdering; fastighetsvärdering; marknadsvärde; auktorisering av värderare;

    Abstract : The value of real estate is a fundamental part of the economy as it is used both as a collateral for loans as well as a key basis for a company’s annual reports. Today there are more than three million real estates in Sweden, and the market value of these can not be directly observed but have to rather be based on estimates. READ MORE

  4. 9. Security Management : Fulfillment of the Government Requirements for a component assurance process

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Naida Kukuruzovic; [2016]
    Keywords : Security management; information security; authentication; authorization; governance; risk management; compliance; user management; Säkerhetshantering; informationssäkerhet; autentisering; auktorisering; styrning; riskhantering; följsamhet; användaradministration;

    Abstract : Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. READ MORE

  5. 10. Is Proportionality Dependent on Legal Certainty?

    University essay from Lunds universitet/Juridiska institutionen

    Author : Fanny Nisses; [2014]
    Keywords : EU law; fiscal law; social and welfare law; tax law; the principle of proportionality; fundamental freedoms; the principle of legal certainty; procedural requirements; Law and Political Science;

    Abstract : Varje medlemsstat har förbehållit sig rätten att lagstifta inom rättsområdet direkt beskattning. Det medför att medlemsstaterna är skatterättsligt suveräna och att gemensamma EU-beslut kan fattas inom detta rättsområde, under särskilda omständigheter. READ MORE