National Repository of Grey Literature 217 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
ISMS Implementation Status Assessment
Černoušek, Robin ; Veselý Jindřich, Ing., MBA (referee) ; Sedlák, Petr (advisor)
Bachelor's thesis deals with the issue of information security management system and evaluation of the current state using a created tool. The theoretical part contains the basic principles and concepts of the whole work. The chapter on the analysis of the current state introduces the organization and describes the current state of its information security management system. The actual design of the solution is a tool in the form of an Excel spreadsheet, which will allow an analysis of the current state of the ISMS implementation level in the company.
Human behaviour monitoring system based on smartphone and bracelet data analysis
Mikulec, Marek ; Zvončák, Vojtěch (referee) ; Mekyska, Jiří (advisor)
There has been established new technological field using smart phones and wearable devices for medical research since the arrival of health 4.0. The main goal of this work is to design, implement and test new system for monitoring people´s behaviour using smart phone and wearable device. These smart compoments should oblige requirements of health~4.0. This work uses open source software AWARE Framework and data from Fitbit API. The final system enables gathering and sharing 36 measurable metrics from smart phone and wearable device. Furthermore it secures efective access to gathered data and puts particular emphasis on the security of the system. Finally the system was used to examine a patterns of REM (Rapid Eye Movement) sleep behaviour disorder.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Systematic Solution for Information Security in Organisation
Palička, Jan ; Dohnal, Matěj (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with ISMS implementation in Netcope Technologies, a. s., which is involved in the production of network cards for high speed acceleration. This thesis is divided into two logical parts. In the first part the theoretical basis information is presented, including selected methods for implementing information security. In the second part, the analysis of the company and the proposed measures are presented.
Implementation of ISMS at Elementary School
Hensl, Marek ; Kapoun, Vladislav (referee) ; Sedlák, Petr (advisor)
This diploma’s thesis deals with information security management system on elementary school. This work is based on long time experience with chosen school and on communication with representatives of elementary school. In this thesis are teoretical basics, specific state, shortcomings and proposed or recommended solutions.
Security GAP analasys in enterprise environment
Sommer, Vojtěch ; Kornelly, Aleš (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with level of information security in selected company environment. For this purpose, a security GAP analysis will be performed based on the recommended standard ISO/IEC 27002. Based on the performed analysis a proposal of security precautions is suggested, which should reduce risk of threats under the acceptable level and also should no longer be in conflict with mentioned standard.
DLP solution as an organization data protection tool
Drápalíková, Jitka ; Mezera Michal, Bc. MSc (referee) ; Sedlák, Petr (advisor)
The bachelor thesis deals with elaboration of data protection proposal using Data Loss Prevention technology for a particular organization. The theoretical part is focused on data problematics in company’s environment and the DLP technology itself. The work also covers the comparison of DLP products on the market, selection of the product, its scope, proposal of setting and calculation.
Information Security as an Indicator of Business Performance
Gancarčik, Rastislav ; Vlastimil,, Svoboda (referee) ; Sedlák, Petr (advisor)
The content of this thesis is a proposal of methodology for evaluating company's performance in areas of information security, while their performance will be judged based on compliance with standard ISO/IEC 27001:2013, Act no. 181/2014 Coll., Regulation 2016/679 of European Parliament and Directive 2016/1148 of the European Parliament. The proposal of this methodology is designed in a particular company which operates in the Czech Republic.
Information Strategy
Jedličková, Marie ; Zahradníček, Pavel (referee) ; Koch, Miloš (advisor)
The existence of an information strategy in a company helps to manage the information system and thereby positively affect the achievement of global strategic goals of the company and its overall market success. This thesis focuses on the creation of an information strategy in a company based on the Czech market, in the sector of small and medium-sized companies. The first part presents theoretical basis of the topic. The second part is devoted to a detailed analysis of the current condition of the company and its potential, which makes it possible in the third part, to identify appropriate amendments, which will be implemented within the enterprise information strategy. The proposed changes will be consistent with the overall strategy of the company and lead to better support of the future development of the company in the market.
Design of security countermeasures implementation in accordance with ISMS for business company
Dočekal, Petr ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on area of security countermeasures in accordance with information security management system. Presents basic theoretical background of information and cyber security and describes a current state in the company. The thesis’s output is the design of security countermeasures implementation which contribute to information security in the company.

National Repository of Grey Literature : 217 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.