National Repository of Grey Literature 63 records found  beginprevious54 - 63  jump to record: Search took 0.00 seconds. 
Registr IT rizik
Kohout, Karel ; Doucek, Petr (advisor) ; Luc, Ladislav (referee)
The theoretical part of the thesis analyzes several selected methodologies and best-practices related to information technology risks management, with focus on documents and guidance developed by ISACA. It builds a set of ideas and basic requirements for effective model of an IT risk register. Strong emphasis is placed on mapping CobiT 4.1 based Risk IT to COBIT 5. The practical part describes implementation of an exploratory web-based IT risk register in Python programming language utilizing the Django framework and employs concepts from the analysis.
Methodics of creating risk register IT
Svěcený, Jan ; Doucek, Petr (advisor) ; Luc, Ladislav (referee)
Nowadays risk management is an essential part of project management. It is necessary to identify, analyze, registr and respond to risks. They have to be assesed by means of the probability of their occurence and their final impacts. One of the tools for risk and response management and for keeping the evidence is risk register. This study will compare different theoretical approaches to risk management (e.g. based on PRINCE2) and based on the comparison a template for risk register and related user guide for different IT project environments will be derived. The study will have two parts: the theoretical part will introduce the issue and analyze different methods; in the practical part will be compared these methods and the template for risk register will be derived together with the user guide.
Security of web pages
Totzauer, Tomáš ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor thesis deals with security of web sites and includes a practical part about security of cloud services. There are described techniques of web sites security at this paper. Web sites use for its operation the HTTP protocol and more secure web pages use the HTTPS protocol, which also includes a security layer called SSL or TLS. Since the web application can never be safer than the protocol that is used, all the protocols and layers are further discussed in this thesis. Especially their characteristics from the perspective of safety, principles of their functioning, their security weaknesses and recommendations in order to reduce risks and increase their safety are closer clarified. The theoretical part continues in disquisition of encryption, related to security layers. Then in the same context, it describes the major certification authorities. The next section analyzes the security of cloud computing. The reader learns about the security risks in connection with the use of the cloud, about standards and legislation. At the end of the theoretical part, trends in the security of cloud computing that we can expect in the coming years are discussed. In the practical part, there could be found attacks against web applications that use both HTTP and HTTPS. Each attack is described in terms of principle and defense techniques against it. This thesis also includes recommendations for proper use of safety layers SSL and TLS which are used on secure web applications. The largest and best known providers of cloud computing from the perspective of securing their services are compared. In this area of IT, there are no borders, so that the world's biggest players are also the biggest in the Czech Republic. Both corporate and private cloud services are explained. For each service, there is a technical description of its security and a preview of safety policy of the organization that operates this service.
Innovation of public administration information system
Ženíšek, Jan ; Luc, Ladislav (advisor) ; Toman, Prokop (referee)
This thesis focuses on the analysis of public administration information system of Příbram and its innovation. This work is divided into two parts. In the first part I evaluate the current state of information system of Příbram. The benefit of this is pointing out the weaknesses and shortcomings of the information system. In the second part I focus on design innovation solutions to information system. The aim of this section is to suggest two alternative solutions and recommend one option. The conclusion is devoted to the recapitulation of the resulting knowledge and evaluation. The recommendation is necessary to explain
Security policies in public sector
Liška, Pavel ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor thesis looks into the field of information security. Rules, trend and goals of information security are defined in the security policy, which is the main topic of this thesis. Firstly, there are defined theoretical terms, rules and general facts of this field. Subsequently, there is described current situation of information security and security policies in public sector, particularly in school institutions and municipal authorities. Important part of this thesis, is definition of legislative perspective on security policy in both fields of public sector in this thesis. Declared goal is primarily the determination of the general elements of the policies from the gained documents, which are subsequently compared and the common characteristics and difference are set.
The issue of malware, its risks and impacts on society
Sakař, Václav ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals with the problem of malware, the problem is a viruses, worms, trojan horses and other computer "vermin". This is a topic that cannot be overlook and which, in today's society, that takes full advantage of internet capabilities, is important. At the beginning of the work is shown the evolution of malware from its beginning until today, together with the forecasted development for the future. There are also shown and described various known types of malware and segments that are most vulnerable malware. At the end of the first part of this work is told how to defend against malware, whether in the field of prevention, protection, or direct the removal of malware itself in case of "infected". In the second, already practically oriented part of the work is done comparing the selected products to protect against malware by me selected and defined criteria and their weights in order to select the best product. At the end of this part the survey is performed to determine what is the awareness about this issue among people. Then it is evaluated and its components will be further described and commented. The contribution of this bachelor thesis is to clarify the issue, describe appropriate protection against malware (along with selecting a suitable product) and determine the level of awareness of this issue among the people.
Security risks for cloud solutions
Kmoštinec, Tomáš ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals with a relatively new concept of cloud computing. The thesis sets out to explain this new paradigm and to define concepts, features, its benefits and indicate new approaches that are already so well characterized by today's ongoing changes in the field of information and communication technologies. Other objectives of the thesis are the analysis and description of fundamental risks associated with security and privacy issues and recommendations on how to mitigate risk of operating in cloud environment.
Spam, abuse of email and options of protecion
Daněk, Tomáš ; Luc, Ladislav (advisor) ; Petera, Martin (referee)
The thesis deals with unsolicited mail known as spam. Its main goal is to present the most widely used current methods of protection against spam and their practical application to achieve the highest possible efficiency. This study aims to find the optimal combination of protection for regular electronic mailbox. In the first part is discussed the history, reasons for the emergence and expansion of mass spam. Furthermore are introduced different types of spam, which differ with their purpose and also their dangerousness. At the end of the first part are presented global statistics for the year 2009, along with estimated total annual cost devoted to fighting spam. Mentioned are the current trends and possible future development of spam. In the second part are presented in detail various widely used methods of protection which vary in principles of operation. Their common goal is reducing the number of spam messages received to the minimum. Also their advantages, disadvantages and pitfalls of their use are analyzed. At the end of the thesis is presented a practical application of those mentioned protections in a particular case. The main contribution of the work should be limitation of received spam to a minimum and reduction of the risks associated with it based on knowledge of techniques and practices used by spammers.
Přehled trhu informačních systémů pro investiční bankovnictví
Krasnovský, Pavol ; Šalamon, Tomáš (advisor) ; Luc, Ladislav (referee)
Práce je zaměřená na informační systémy v oddělení dealingu v investičním bankovnictví. Cílem práce je zmapovat informační systémy a pokrytí informační potřeby v odděleni dealingu. Celá práce poskytuje rozhled čtenáři, který chce v srozumitelné formě pochopit podstatu bankovního dealingu. Práce má za cíl zabývat se také investičními trendy, které významně ovlivňují činnost investičních subjektu. Přínos této práce spočívá v podrobném zmapování informačního systému oddělení dealingu, které je doplňováno zejména autorovými zkušenostmi a různými testy a průzkumy. Pomocí analýzy investičních trendů poukazujeme na fakt, že investiční banky jsou silně ovlivňovány těmito trendy. Při analýze srovnání produktů jsme dospěli k závěru, že na českém trhu působí 5 velkých hráčů, kteří se zabývají vývojem softwaru pro investiční bankovnictví a pokrývají 90% poptávky na trhu. Nicméně funkcionalita srovnávaných produktů od 5 velkých hráčů na českém trhu je velice podobná, což nasvědčuje nasycenosti trhu informačních systémů v investičním bankovnictví. Práce také popisuje jednotlivé aplikace (technické, automatizované,fundamentální a psychologické), které tvoří důležitou součást obchodování. Tato práce přináší i novou taxonomii aplikace pro fundamentální analýzu. Nezbytnou součástí obchodování je i pokrytí informační potřeby. Tato informační potřeba je pokryta rozdílně, jak pro jednotlivé lokality trhu, tak i pro jejich účastníky.
Risk analysis of information systems
Král, Miroslav ; Luc, Ladislav (advisor) ; Mikulecký, Jan (referee)
Target of this study is to provide complete general view on security information management, which is classified into theoretical and practical part. There are defined processes of information security risk management and methodologies used for analysis of information systems, focus on risk management (CRAMM, OCTAVE, and MEHARI). There is reason for methodology choice at the end of practical part. Methodology CRAMM is used for risk analysis of information system in hospital environment. Last chapter of this study is dedicated to summary of results and there is approved project. Target of this project is applying of recommendations which result from analysis made. Contribution of this project is practical methodology usage and conceptual validation of theoretical frames in practice.

National Repository of Grey Literature : 63 records found   beginprevious54 - 63  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.