National Repository of Grey Literature 214 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
Design of smart home control systém and security management
Valentová, Kateřina ; Kubek, Ján (referee) ; Sedlák, Petr (advisor)
This master's thesis is focused on design of smart home control system with focus onsecurity of system in terms of information, network and physical security. Design is based on the requirements of the house owner and his needs. In thesis is assembled risk analysis with security measures to the individual threats. Complete design of cable system is not a part of this work, thesis is particularly focused on questions about security of the entire intelligent system.
Building security awareness at the Faculty of Business and Management
Volfová, Jana ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
This diploma thesis is focused on Security Awareness Education at the Faculty of Business and Management. It consists of three main parts: theoretical, analytical and practical considerations. The theoretical part is the introduction to basic terms, processes and analysis to help understand the thesis. The analytical part includes an introduction to the chosen organization and the implementation of analysis, which were presented in the theoretical part. The practical part contains, among other things, the actual proposals for Security Awareness Education at the faculty and its benefits.
Evaluating the Information System and Processes of a Business
Zvolánek, Milan ; Veselý, Miroslav (referee) ; Brož, Zdeněk (advisor)
This master thesis deals with the analysis of information system and selected processes linked to the information system. It contains teoretical foundations of the selected problem, analysis and information system assessment and proposes several changes in order to make the information system and processes more efficient.
Information System Assessment and Proposal of ICT Modification
Závodný, Jiří ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
The bachelor thesis is focused on the analysis of the information system in XCR Svorada s.r.o. and a subsequent proposal for amendments. The first part is devoted to the theoretical background needed to understand the issue. Furthermore, the analysis of the company, its internal and external environment, the analysis of the information system used and in the last part of the proposal changes for improving, streamlining and simplifying the work with the information system.
Solution of Internal Threats in the Information Security Management System
Trčka, Martin ; Sopuch, Zbyněk (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with internal threats in the organization and their restriction with the assistance of DLP system. The first part of the thesis discusses the information security management system and describes requirements for the introduction of the ISO/IEC 27000 standards series. Next chapters detail internal threats and technical description of the DLP system. The second part of the thesis analyzes the organization and describes the process of implementation of DLP solution, which aims to reduce internal threats. The conclusion of the thesis describes acceptance agreement and financial evaluation of the implementation.
Draft of Information Security Methodology in Company Running Electronic Commerce
Mráčková, Kateřina ; RNDr. et RNDr. Vladimír Mazálek, PhD., DBA (referee) ; Sedlák, Petr (advisor)
The work deals with the analysis of security management in company selling goods trought the stone shop and the electronic commerce. The assets and threats affecting them were identified and an analysis of risks and selected measures was evaluated. The work is based on the theoretical background from series of standards ISO/IEC 27000 given in the first part of it.
Acquisition of email communication security service according to ISMS
Foltýn, Adam ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The diploma thesis focuses on a proposal of acquisition of email communication security service according to ISMS for a company which provides trading services on financial markets. The thesis is divided into three parts. In the theoretical part, necessary terms and theoretical essentials are explained in order to ensure understanding of the following parts of the thesis. The following analytical part describes the company's current security status of information. As a solution in the final part of the thesis, partial risk analyses are conducted. Based on these, suitable options for email communication security measures are proposed as well as their the economical evaluation.
ISMS Implementation Status Assessment
Černoušek, Robin ; Veselý Jindřich, Ing., MBA (referee) ; Sedlák, Petr (advisor)
Bachelor's thesis deals with the issue of information security management system and evaluation of the current state using a created tool. The theoretical part contains the basic principles and concepts of the whole work. The chapter on the analysis of the current state introduces the organization and describes the current state of its information security management system. The actual design of the solution is a tool in the form of an Excel spreadsheet, which will allow an analysis of the current state of the ISMS implementation level in the company.
Human behaviour monitoring system based on smartphone and bracelet data analysis
Mikulec, Marek ; Zvončák, Vojtěch (referee) ; Mekyska, Jiří (advisor)
There has been established new technological field using smart phones and wearable devices for medical research since the arrival of health 4.0. The main goal of this work is to design, implement and test new system for monitoring people´s behaviour using smart phone and wearable device. These smart compoments should oblige requirements of health~4.0. This work uses open source software AWARE Framework and data from Fitbit API. The final system enables gathering and sharing 36 measurable metrics from smart phone and wearable device. Furthermore it secures efective access to gathered data and puts particular emphasis on the security of the system. Finally the system was used to examine a patterns of REM (Rapid Eye Movement) sleep behaviour disorder.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.

National Repository of Grey Literature : 214 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.