Essays about: "säkerhetshantering"

Showing result 6 - 9 of 9 essays containing the word säkerhetshantering.

  1. 6. Mixed Integer Linear Programming for Allocation of Collateral within Securities Lending

    University essay from KTH/Optimeringslära och systemteori

    Author : Martin Wass; [2020]
    Keywords : Collateral; collateral management; optimisation; mixed integer linear programming; collateral allocation; opportunity cost; triparty collateral management; counterparty risk; Säkerheter; säkerhetshantering; optimering; blandat-heltal linjär programmering; alternativkostnad; motpartsrisk; tripartykostnad;

    Abstract : A mixed integer linear programming formulation is used to solve the problem of allocating assets from a bank to its counterparties as collateral within securities lending. The aim of the optimisation is to reduce the cost of allocated collateral, which is broken down into the components opportunity cost, counterparty risk cost and triparty cost. READ MORE

  2. 7. Optimization of Collateral allocation for Securities Lending : An Integer Linear Programming Approach

    University essay from KTH/Optimeringslära och systemteori

    Author : Magnus Orrsveden; Emil Tarukoski; [2019]
    Keywords : Collateral Management; Collateral optimization; Operations Research; Linear Programming; Collateral Management; Collateral optimization; Operations Research; Linear Programming;

    Abstract : Collateral management has, during the most recent years, been an increasingly important part of a bank’s operation. The bank is facing an allocation problem of how to post collateral to all its counterparties in order to mitigate the credit risk and the number of transactions that requires collateralization is increasing. READ MORE

  3. 8. Who hacked my toaster? : A study about security management of the Internet of Things.

    University essay from Linköpings universitet/Informatik; Linköpings universitet/Filosofiska fakulteten

    Author : Mårten Hakkestad; Simon Rynningsjö; [2019]
    Keywords : Internet of Things; IoT; Updating; Monitoring; Responding; Security Management; Cyber Resilience; Middle of Life; MoL; Sakernas Internet; Internet of Things; IoT; Uppdatera; Övervaka; Reagera; Säkerhetshantering; Cyber Motståndskraft; Cyber Resilience; Mitten av Livet; MaL;

    Abstract : The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters. READ MORE

  4. 9. Security Management : Fulfillment of the Government Requirements for a component assurance process

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Naida Kukuruzovic; [2016]
    Keywords : Security management; information security; authentication; authorization; governance; risk management; compliance; user management; Säkerhetshantering; informationssäkerhet; autentisering; auktorisering; styrning; riskhantering; följsamhet; användaradministration;

    Abstract : Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. READ MORE