National Repository of Grey Literature 509 records found  beginprevious470 - 479nextend  jump to record: Search took 0.00 seconds. 
A Proposal for a Security System of the Company Premises
Černý, Jan ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The content of this thesis is the complex security system proposal, specifically of PZTS system and CCTV system. The thesis is divided into three parts. The first part is analysis of the current state, the second is theoretical part and the third part is a practical part. The first part deals with the analysis of the current state of physical security and technical protection of the premises. The theoretical part deals with theoretical solutions for security system proposal. The practical part is focused on separate PZTS and CCTV systems proposal, that will meet all the requirements and standards of the customer.
Information Security Management in Healthcare Organization
Hajný, Jiří ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The diploma thesis focuses on implementation and deployment of information security management system (ISMS) into healthcare organizations. Specifies what is required to include in this process and what not to forget. It includes a risk analysis of a branch of the selected company, and for it is written a safety guide. Safety guide provides advice and recommendations regarding security in terms of human resources, physical security, ICT security and other aspects that should be included in the ISMS deployment in healthcare organizations. The work also reflects the newly emerging law on cyber security. It is expected that the law will also address cyber security in healthcare.
The Implementation of ISMS in Small Company Focused on ICT
Kosek, Jindřich ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The diploma thesis is focused on the design implementation of information security management system in a small business and is applying theoretical knowledge to real-life situations in a manufacturing company. First of all is performed analysis of current status and the consequent threats which can affect the company's assets. Thereafter are proposed measures based on identified risks and requirements of the owner.
The Integration of the ERP System Helios Easy and E-commerce Solution
Konečný, Martin ; Sedlák, Petr (referee) ; Sodomka, Petr (advisor)
This diploma thesis focuses on the issue of implementation of ERP system for small company, and proposes a solution to create a custom enterprise system for e-commerce, which is integrated with the ERP system. Author´s proposals are conceived in the form of a project, including definition of goals, definition of the logical framework, time analysis, risk analysis and economic evaluation.
Proposal of Methodics for ISMS Guide and Measures Applied to Selected Areas
Nemec, Tomáš ; Vonyš, Rudolf (referee) ; Sedlák, Petr (advisor)
Content of this thesis is a methodology for creating ISMS Security Manual. Implementation of the proposal is supported by theoretical knowledge in the introductory part of this work. Practical process design methodology is conditional on the structure of the international standard ISO/IEC 27001:2005.
Implementation Methodology of Network Security in the Software Company
Tomaga, Jakub ; Sopuch, Zbyněk (referee) ; Sedlák, Petr (advisor)
This thesis deals with network security and its deployment in the real environment of the software company. The thesis describes information management framework with a specific concentration on computer networks. Network security policy is designed as well as network infrastructure modifications in order to increase the level of security. All parts of the solution are also analyzed from financial point of view.
Design of Information Security Methodology in the Company
Bartoš, Lukáš ; RNDr. et RNDr. Vladimír Mazálek, PhD., DBA (referee) ; Sedlák, Petr (advisor)
This thesis proposes a design of information security methodology in the company. After the theoretical bases of this thesis is introduced company for which is intended this work. Then is performed analysis of risks based on selected assets and potential threats. Followed by design of the measures to minimize the creation of possible risks in the company.
Security Control and Remediation Activities in Enterprise Environment
Zápotočný, Matej ; Šoukal, Petr (referee) ; Sedlák, Petr (advisor)
Cílem této práce bylo popsat řízení bezpečnosti a kontrolní mechanizmy, které jsou používané v korporátním prostředí. Práce se zabývá teoretickým popisem standardů používaných pro aplikační bezpečnost, dále popisuje nástroje určené pro získavání informací o firemním prostředí, které mohou být použity pro odhalovaní bezpečnostních zranitelností, nebo pro jejich odstranění. Také popisuje procesy, kterými se mají společnosti řídit, aby byla minimalizována možnost dopadu na produkci a rovněž zaručena trvalá bezpečnost prostředí. Uvedené jsou i kontroly dosažených výsledků při použití nových technologií a jejich finanční i časové výhody.
Implementation of ISMS in the Commercial Company
Dejmek, Martin ; Soška, Libor (referee) ; Sedlák, Petr (advisor)
This master thesis deals with the implementation of information security management system in the company. It summarizes the theoretical background in this field and uses it to analyze the current state of information security, as well as analysis and risk management and not least the actual implementation of ISMS in the particular company. This work also contains three groups of measures that reduce the impact of identified risks and which also implements an essential parts of ISMS.
Security Management of Information Systems for the Kaliště Municipality
Kutiš, Pavel ; Bláha, Lukáš (referee) ; Sedlák, Petr (advisor)
This Diploma Thesis is being focused on Information Security Management System implementation for a certain municipality. The work has been divided into two parts. The first part deals with theoretical basis which are based on the ISO/IEC 27000 standards. The second part contains the practical implementation following the theoretical background from the first part. The implementation itself has been divided into three stages and this thesis is mainly concentrated on the first stage.

National Repository of Grey Literature : 509 records found   beginprevious470 - 479nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.