National Repository of Grey Literature 311 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Implementation of the minimum security standard in company
Křiva, Adam ; Květoslav,, Hošek (referee) ; Sedlák, Petr (advisor)
The subject of the diploma thesis is the implementation of a minimal security standard within a company. The thesis focuses on theoretical foundations in the first part. Subsequently is conducted an analysis of the current state within the company. The actual solution proposal determines the scope of the minimal security standard, identifies and evaluates assets, describes the created security policies from the managerial and technical aspects. The developed security policies are then economically assessed.
The Impacts of a Ransomware Attack: Risk Management and Implementation of the Minimal Security Standard
Syrovátková, Lucie ; Alena,, Rybáková (referee) ; Sedlák, Petr (advisor)
The aim of the thesis is to implement cyber security in a small company as a result of a suffered ransomware attack based on the requirements of the Minimal Security Standard, which is a support material for entities that are not regulated by the Cyber Security Act in the Czech Republic. The main goal is achieved through the three main parts into which the thesis is divided. The introductory part is a theoretical support for the remainder of the thesis and contains the main concepts and areas that are used in the thesis. The analytical part focuses on the description of a possible vector of a ransomware attack and its consequences. In the second part of the analytical chapter, the current situation of the company is assessed in comparison to the requirements of the Minimal Security Standard. The last part proposes specific security measures, creation of security policies adapted to the company's capabilities and an economic evaluation.
Implementation of the security minimum for the company
Havlas, Matej ; Martin,, Konečný (referee) ; Sedlák, Petr (advisor)
The content of my diploma thesis is the implementation of a security minimum for a company based on available literature and knowledge acquired during the study at BUT Faculty of Management. The first part will focus on the theoretical background of the work. The second part will focus on the analysis of the current state and the third part will focus on proposing a solution, which will be based on the analysis of the current state, legislation, and the theoretical background of the work. The conclusion of the work will summarize the results of the implementation based on an external audit and future steps that the company can take to improve their security.
Methodology for specific cloud certifications
Vyšatová, Simona ; Adam,, Kučínský (referee) ; Sedlák, Petr (advisor)
The master thesis deals with the topic of cloud certifications. Its main goal is to create a methodological material for the National Cyber and Information Security Agency (NUKIB) and the general public, which summarizes the basic differences between the most important cloud certifications and compares with the European Cloud Certification Scheme – Cybersecurity Certification Scheme for Cloud Services (EUCS). The thesis defines basic concepts related to cloud computing, introduces individual cloud schemes (EUCS, SOC 2, C5, eGovernment cloud), key players in the field of cloud computing regulation and certification and the most important cloud service providers. Subsequently, a practical comparison of the presented cloud certifications is made and some impacts of the adoption of EUCS are analysed. The selected differences will serve as a source for further decision making for the NUKIB when working with the EUCS scheme.
Analysis of electrical properties of ionic-liquid-based polymer electrolytes with respect to their crystallinity
Chválová, Zuzana Lujza ; Holcman, Vladimír (referee) ; Sedlák, Petr (advisor)
Solid polymer electrolytes based on ionic liquids are promising materials to replace conventional liquid electrolytes for electrochemical technologies. This bachelor’s thesis deals with their electrical characterization using dielectric relaxation spectroscopy. Mainly their electrical conductivity is analyzed and the results are described with respect to the different level of the crystalline structure of the electrolytes, caused by different preparation conditions. Subsequently, the work focused on the description of the charge transport mechanism, ion conductivity models, and their verification. The results showed that the crystallinity of the electrolytes decreases with the increase of evaporated solvent, which also leads to an increase in their conductivity. Jonscher type power law, which generally describes charge transport mechanisms in the studied electrolytes, and Dyre’s model, which is suitable for describing conductivity at higher frequencies, were verified.
The design of the cybersecurity training methodology for middle and top management
Kosková, Zdeňka ; Lukáš,, Kubík (referee) ; Sedlák, Petr (advisor)
The diploma thesis addresses the issue of developing the methodology for cybersecurity training of middle and top management. The goal is to propose a methodology for the needs of energy company, wich will be focused on education of the target group of employees that represents a high-risk. The introductory part is focused on theroretical basis such as basic terminology, current legislation and security awareness education. The analysis is focused on the current state of the cyber and infromation security education program in the energy company. The actual solution contains the proposal of the methodology itself and its specific solution with regard to the current state and needs of the organization.
Implementation of Basic Security Measures in Medical Facility
Soukupová, Marie ; Svoboda Vlastimil, Ing. MBA (referee) ; Sedlák, Petr (advisor)
The diploma thesis presents a proposal for the implementation of basic security measures in a medical facility. In addition to describing the specific managerial and technical measures that the hospital must implement, the thesis also includes an information strategy and a proposal for building security awareness of the hospital staff. The thesis also describes the creation of a set of security guidelines, including a compliance manual with the Cybersecurity Decree.
Design of information security management in accounting outsourcing environment
Hlaváček, Matěj ; Hamouz Zdeněk, Ing. MBA (referee) ; Sedlák, Petr (advisor)
This paper analyses and proposes improvements to information security management at company XYZ. To this end, it uses various tools, frameworks, and analyses to assess the current state of security management. These tools include BPMN notation for processes, Esko software for asset and risk management, PESTLE analysis, Porter's analysis, 7S framework, and IFE and EFE matrices. The paper examines, describes, and evaluates the current state of security management and then proposes processes and procedures for information management, vendor management, human resource management, change management, business continuity, security audits, physical security, access control, mobile device management and other aspects. The paper concludes by presenting the valuable benefits and costs associated with implementing effective security management in a small company.
Design of data center support infrastructure
Špičák, Jan ; Svoboda Vlastmil, Ing. MBA (referee) ; Sedlák, Petr (advisor)
The subject of this thesis is the design of infrastructure for support technologies within a data centre in Nový Hradec Králové. The design takes into account the security of the data center and monitoring systems over the technologies, ensuring failure-free operation of the data centre. The proposed solution is compliant with Uptime Institute's Tier IV design (TCDD) certification.
Analysis of privileged access management solutions using the CyberArk platform
Nečas, Adam ; Zbořil Martin, Ing. Mgr. PhD (referee) ; Sedlák, Petr (advisor)
This thesis focuses on the analysis of privileged access management solutions using the CyberArk platform. The thesis deals with explaining the basics of PAM, including its meaning, key components and best practices. An analysis of the implemented solution, strong authentication and authorization mechanisms, monitoring and management of privileged sessions is prepared for the company. The results of this analysis offer valuable insights into the current state of PAM solutions and provide practical recommendations for a company that plans to improve current PAM solutions.

National Repository of Grey Literature : 311 records found   1 - 10nextend  jump to record:
See also: similar author names
16 SEDLÁK, Pavel
16 Sedlák, Pavel
25 Sedlák, Petr
1 Sedlák, Petr Bc.
Interested in being notified about new results for this query?
Subscribe to the RSS feed.