National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Price models and SLA for shared services of data centers
Štefek, Ivan ; Voříšek, Jiří (advisor) ; Bruckner, Tomáš (referee)
Thesis Price models and SLA for shared services of data centers has as objective to establish best practice, so-called "best practices" of SLA and price models for data center services. Work is divided into two parts, theoretical and practical part. The theoretical section is wants to familiarize the reader with the basic concepts such as outsourcing, reasons and risks of use. I describe the base models for providing IT services as well as pricing models for services as described in the literature. I will focus on data centers and TIER standard categorization, too. The practical part is based on an analysis of information that I got from an interview with the experts working for the biggest data center companies in the Czech Republic. Based on this information, I tried to compile the best practices for creating pricing models for data center services that are actually used in practice. Specifically, the server housing, server hosting and virtual server services. Also, for these services create an SLA that can be used by some data center company in the Czech Republic.
Risk Analysis for establishing of new application into the information system in banking
Štefek, Ivan ; Doucek, Petr (advisor) ; Klas, Jan (referee)
Bachelor thesis Risk Analysis for the establishing of new application into the information system in banking deals with the management of information security and Risk Analysis. Thematically is thesis divided into two parts, theoretical part and practical part. In the theoretical part I inform the reader with the concept of information security and three basic components. I am going to tell about the basic methodology for IT management. In the end I am going to tell something about threats and their impacts. The practical part is based on a summary of theoretical knowledge and there is a practical example. In my example of application My Bank I try to show the information risk analysis. Risk analysis consists of three main parts. In the first part is information classified in the application. There are three points of view, first is confidentiality, second is integrity and third is availability. In second part I try to look at threats and evaluate according to their likelihood. The final section compares the building secure of application with security, which should application have according to degree of risk classification.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.