National Repository of Grey Literature 6 records found  Search took 0.00 seconds. 
Integration of SELinux Audit Logs into ABRT Tool
Vrabec, Lukáš ; Kačic, Matej (referee) ; Barabas, Maroš (advisor)
The main aim of the thesis is to introduce the security of Linux operating systems and the access control list mechanism. The thesis focuses on processing security messages produced by the security mechanism into logging services and on displaying those messages. In addition, the thesis includes a concept solution and its implementation, which integrates security messages into a centralized system, keeps them and reports bugs in the Linux community distribution Fedora and in the Linux commercial distribution Red Hat Enterprise Linux.
System for Audit Support of Information Security Management
Soukop, Tomáš ; Květoňová, Šárka (referee) ; Kreslíková, Jitka (advisor)
This master thesis describes creation of system for audit support of information security management. In the next chapters I will explain what is the information security, system of information security, audit system and what standards we have for this. Last but not least is described how to create a system for audit support. The whole design is created with usage of standards for quality management and information security management. System is oriented for web environment.
Integration of SELinux Audit Logs into ABRT Tool
Vrabec, Lukáš ; Kačic, Matej (referee) ; Barabas, Maroš (advisor)
The main aim of the thesis is to introduce the security of Linux operating systems and the access control list mechanism. The thesis focuses on processing security messages produced by the security mechanism into logging services and on displaying those messages. In addition, the thesis includes a concept solution and its implementation, which integrates security messages into a centralized system, keeps them and reports bugs in the Linux community distribution Fedora and in the Linux commercial distribution Red Hat Enterprise Linux.
System for Audit Support of Information Security Management
Soukop, Tomáš ; Květoňová, Šárka (referee) ; Kreslíková, Jitka (advisor)
This master thesis describes creation of system for audit support of information security management. In the next chapters I will explain what is the information security, system of information security, audit system and what standards we have for this. Last but not least is described how to create a system for audit support. The whole design is created with usage of standards for quality management and information security management. System is oriented for web environment.
Audit system and contracting of public procurements
Smolová, Kateřina ; Pavel, Jan (advisor) ; Vítek, Leoš (referee)
The aim of the thesis is to analyze the audit system of public procurements and to evaluate whether the audit system is sufficient. The first part focuses on contracting authority and regulations which must be complied with to act upon the public procurement law. The second part characterizes the segments of audit system which proceed in the connection with the public procurements contracting. The last part deals with the real state of execution of the public procurements audit in the state administration and its evaluation.
Security and Protection of Data and Information in Banking Business for Managers
Melichar, Jan ; Pokorný, Pavel (advisor) ; Pertlíček, Michal (referee)
This dissertation describes information as an economic object and focuses on information security with reference to all technical and social aspects and documents the necessity to consider both those areas simultaneously. The dissertation determines information security standards and describes some tools being used for effective data protection and information systems protection. One part of this dissertation is a model design for effective controlling of data and process protection, which can be used by bank managers on process control design especially in transaction processing area. This model is divided into several logical and consequential blocks and provides help to operating managers to design or redesign new or existing processes accordingly. The dissertation clearly highlights related insufficiencies especially those related to data access protection and passwords and one related survey has been performed to prove that

Interested in being notified about new results for this query?
Subscribe to the RSS feed.