National Repository of Grey Literature 128 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Conversion between Formats for Sharing of Network Security Alerts
Eis, Pavel ; Wrona, Jan (referee) ; Žádník, Martin (advisor)
There are many platforms and systems designed for sharing cyber security incidents and events, which often use different security formats. This way it gets harder or even not possible to share security incidents and events between organizations, which are using these platforms. Solution of this problem may be creation of converters, which are capable of converting used security formats between each other. This work solves conversion between security formats IDEA, MISP and STIX. In the process of conversion, it is important to care about conversion flow, to prevent information loss or different category of event assignment, than which it was originally represented by. If the conversion is accurate enough, it can be easier achieved more precise and broader analysis of cyber security incidents.
Statistical output of security audits
Hrubešová, Gabriela ; Vlastimil,, Svoboda (referee) ; Sedlák, Petr (advisor)
The subject of this diploma thesis is a statistical analysis of security audits. The theoretical part describes key terms in the field of cyber and information security, basic background for this area and important regulations. The next part focuses on the description of security audit, its course, necessary conditions and content. The last part is devoted to statistical analysis of obtained samples. We analyse samples from several points of view, compare and look for features and information that could be helpful to the auditor’s assessment.
Draft Recovery Plan for the infrastructure of the Faculty of Business and Management
Srnec, Jan ; Kubek, Ján (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the proposal of a “Disaster Recovery Plan” for the Informatics department at BUT’s Faculty of Business and Management. The first part consists of theoretical basis of crucial parts of disaster recovery plan, which is the very foundation for the proposal itself. The second part follows up with a description of the server room of the Informatics department, in particular its IT equipment. The third part deals with the very disaster recovery plan proposal which will function as a school code regulation and a foundation for a Business Continuity Management System document.
The Implementation of ISMS in a Small Company
Svoboda, Milan ; Vlastimil,, Svoboda (referee) ; Sedlák, Petr (advisor)
The diploma thesis focuses on proposing an information security management system (ISMS) in a small company. This publication includes theoretical facts, which are needed to understand and design a ISMS. The design proposal of the ISMS itself is based on an analysis of the current status of the company's information security. The proposed security measures are based on the actual state of information security within the company, and on recommendations stemming from the ISO/IEC 27000 standard.
GAP analysis of information security management system
Konečný, Martin ; Tomáš,, Krejčí (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on GAP analysis of information security management system. The thesis consists of theoretical, analytical and practical part. The first part discusses the theoretical background of the issue of information and cyber security. The analytical part describes the current condition of the researched company. The thesis’s output is the draft of risk register and draft of security countermeasures implementation. The draft targets on countermeasures leading to increase information security in company.
Automation of a Red Team in KYPO cyber range
Boháček, Milan ; Drašar Martin, RNDr. Ph.D (referee) ; Sedlák, Petr (advisor)
Tato diplomová práce zkoumá možnost automatizace činností červeného týmu při tréninku v kybernetické aréně. Práce obsahuje zhodnocení současného stavu v oblasti automatizace červeného týmu a penetračního testování a následně představení nástroje, který lze využít právě pro automatizaci činností červeného týmu při cvičeních kybernetické bezpečnosti.
Creating a help desk SW tool for cyber security management
Brzobohatá, Veronika ; Svoboda Vlastimil, Ing., MBA (referee) ; Sedlák, Petr (advisor)
The diploma thesis is focused on the creation of a helpdesk design for ESKO software. This ESKO software was developed by ISIT Slovakia s.r.o. The helpdesk will be represented by several software. Some are used to create diagrams and represent workflows, others for graphic editing. The helpdesk will be created based on the current needs of the company and then delivered to it as the final product. The main goal is to extend the functionality of an existing website and add to this website and the proposed helpdesk. The bonus will be a query library, which should work on the principle of an SQL database.
5G network – how will it change our lives?
Ondriska, Josef ; Rujbrová, Šárka (referee) ; Jašková, Jana (advisor)
Tato bakalářská práce popisuje koncept páté generace bezdrátových systémů a diskutuje její hlavní přínosy i rizika. Práce uvádí stručný přehled vývoje mobilních komunikačních sítí. Popisuje funkci každé generace a uvádí její vlastnosti. Dále popisuje koncept 5G sítě, uvádí její parametry a klíčové faktory, které vedly k jejímu vzniku. V další části se práce věnuje internetu věcí, uvádí jeho historii a možné uplatnění společně se sítěmi 5G. Jmenuje nejrůznější oblasti využití a definuje, jak bude společnost z této technologie těžit. Závěrem se práce zabývá možnými hrozbami, ať už jde o lživé informace, nebo skutečná rizika jako jsou negativní dopady na lidské zdraví či bezpečnost s ohledem na osobní vlastnictví.
Assessment and a Proposal for Information Security in the Organization
Rybáková, Alena ; Šarbort, Jakub (referee) ; Ondrák, Viktor (advisor)
This diploma thesis deals with the issue of information security in the organization. Author's effort is to gain a broad overview of connections, which will then be evaluated in the final section, providing concrete recommendations. In this thesis it is discussed information security management system, service management system and cyber security, both in theory and in terms of real application in a particular organization. The aim is to provide own recommendations for improvement.
Methodology of a security audit
Kroupová, Hana ; Hana,, Sobotková (referee) ; Sedlák, Petr (advisor)
The master‘s thesis is focused on security audit. The aim of this thesis is to create methodology, which might help with creating security audits and research current condition of cybernetic and information security in a business establishment. Theoretical part explains basic terms and concepts about cyber and information security. Own interpretation consist description of methodological areas of security audit.

National Repository of Grey Literature : 128 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.