National Repository of Grey Literature 214 records found  previous11 - 20nextend  jump to record: Search took 0.02 seconds. 
Systematic Solution for Information Security in Organisation
Palička, Jan ; Dohnal, Matěj (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with ISMS implementation in Netcope Technologies, a. s., which is involved in the production of network cards for high speed acceleration. This thesis is divided into two logical parts. In the first part the theoretical basis information is presented, including selected methods for implementing information security. In the second part, the analysis of the company and the proposed measures are presented.
Implementation of ISMS at Elementary School
Hensl, Marek ; Kapoun, Vladislav (referee) ; Sedlák, Petr (advisor)
This diploma’s thesis deals with information security management system on elementary school. This work is based on long time experience with chosen school and on communication with representatives of elementary school. In this thesis are teoretical basics, specific state, shortcomings and proposed or recommended solutions.
Security GAP analasys in enterprise environment
Sommer, Vojtěch ; Kornelly, Aleš (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with level of information security in selected company environment. For this purpose, a security GAP analysis will be performed based on the recommended standard ISO/IEC 27002. Based on the performed analysis a proposal of security precautions is suggested, which should reduce risk of threats under the acceptable level and also should no longer be in conflict with mentioned standard.
DLP solution as an organization data protection tool
Drápalíková, Jitka ; Mezera Michal, Bc. MSc (referee) ; Sedlák, Petr (advisor)
The bachelor thesis deals with elaboration of data protection proposal using Data Loss Prevention technology for a particular organization. The theoretical part is focused on data problematics in company’s environment and the DLP technology itself. The work also covers the comparison of DLP products on the market, selection of the product, its scope, proposal of setting and calculation.
Information Security as an Indicator of Business Performance
Gancarčik, Rastislav ; Vlastimil,, Svoboda (referee) ; Sedlák, Petr (advisor)
The content of this thesis is a proposal of methodology for evaluating company's performance in areas of information security, while their performance will be judged based on compliance with standard ISO/IEC 27001:2013, Act no. 181/2014 Coll., Regulation 2016/679 of European Parliament and Directive 2016/1148 of the European Parliament. The proposal of this methodology is designed in a particular company which operates in the Czech Republic.
Information Strategy
Jedličková, Marie ; Zahradníček, Pavel (referee) ; Koch, Miloš (advisor)
The existence of an information strategy in a company helps to manage the information system and thereby positively affect the achievement of global strategic goals of the company and its overall market success. This thesis focuses on the creation of an information strategy in a company based on the Czech market, in the sector of small and medium-sized companies. The first part presents theoretical basis of the topic. The second part is devoted to a detailed analysis of the current condition of the company and its potential, which makes it possible in the third part, to identify appropriate amendments, which will be implemented within the enterprise information strategy. The proposed changes will be consistent with the overall strategy of the company and lead to better support of the future development of the company in the market.
Design of security countermeasures implementation in accordance with ISMS for business company
Dočekal, Petr ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on area of security countermeasures in accordance with information security management system. Presents basic theoretical background of information and cyber security and describes a current state in the company. The thesis’s output is the design of security countermeasures implementation which contribute to information security in the company.
The Design of a Perimeter Security Solution of an Organization
Dupač, Viktor ; Krejčí, Tomáš (referee) ; Sedlák, Petr (advisor)
This thesis describes the design of a perimeter security solution of an organisation. In the first part of this thesis I am describing some theoretical basics and since chapter six I start describing the main topic of this thesis. In the first logical part of the main topic part I am describing a present situation of an organisation and starting the planning of the solution. In the second logical part of the main topic part I am describing the router Turris Omnia. In that part I am describing this device from different angles. Then next logical part describes the final solution of a perimeter security solution of an organisation. And finally after that there is the part of the evaluation and benefits of this thesis and the conclusion of this thesis.
Information System Assessment and Proposal of ICT Modification
Sládek, Adam ; Moudrá, Libuše (referee) ; Novák, Lukáš (advisor)
The main idea of this bachelor thesis is to analyse information system of VZP, which contains all information about their clients. Access to this system is provided through company Elso Service s.r.o., which manages it for VZP. There is a teoretical and also practial part. The teoretical part describes and explains the main terms from information system theory. The practical part analyse the present quality of the system and suggests possible solutions for better funcionality of the system.
Assessment of the level of cyber risks using the proposed tool
Černoušek, Robin ; Veselý Jindřich, Ing. MBA (referee) ; Sedlák, Petr (advisor)
The thesis deals with the issue of information security management system and determination of the current level of cybersecurity maturity and determination of risk areas. The theoretical part contains the basic background and concepts of the whole thesis. The chapter of the current state analysis introduces the organization and describes the current state of its information security management system and risk management. The actual design of the solution is a tool created in MS Excel that allows the organization to determine the current level of risk.

National Repository of Grey Literature : 214 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.