National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Information System Efectiveness Assessment and Proposal for ICT Modification
Smolík, Luboš ; Ráček, Daniel (referee) ; Neuwirth, Bernard (advisor)
This thesis focuses on the draft amendments for further business development in the company. Draft amendments based on findings from the analysis of the current state of IS and related processes in the company. The proposed amendments will take place requirements on the company information system and the strategic goals of the company.
Information System Efectiveness Assessment and Proposal for ICT Modification
Smolík, Luboš ; Ráček, Daniel (referee) ; Neuwirth, Bernard (advisor)
This thesis focuses on the draft amendments for further business development in the company. Draft amendments based on findings from the analysis of the current state of IS and related processes in the company. The proposed amendments will take place requirements on the company information system and the strategic goals of the company.
Attack Trees
MAI, Pavel
Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node [1]. We need a model of threats against computer systems. If we can understand all the different ways in which a system can be attacked, we can likely design countermeasures to thwart those attacks. And if we can understand who the attackers are - not to mention their abilities, motivations, and goals - maybe we can install the proper countermeasures to deal with the real threats [1].

Interested in being notified about new results for this query?
Subscribe to the RSS feed.