National Repository of Grey Literature 133 records found  beginprevious107 - 116nextend  jump to record: Search took 0.02 seconds. 
Design of security countermeasures implementation in accordance with ISMS for business company
Dočekal, Petr ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on area of security countermeasures in accordance with information security management system. Presents basic theoretical background of information and cyber security and describes a current state in the company. The thesis’s output is the design of security countermeasures implementation which contribute to information security in the company.
Proposal for the implementation of security awareness program at grammar school
Holásková, Marie ; Neuwirth, Bernard (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with the issue of building security awareness at grammar schools. The thesis can be divided into three main parts. The introductory part introduces the theoretical definition of basic concepts in the area of information security and a brief description of the legislative requirements to be followed in solving the work. The second part analyzes the current situation of selected grammar school, including risk analysis, HOS 8 analysis and SWOT analysis. In the practical part, the proposal to introduce a security awareness program adapted to the grammar school.
Promotion of regional development in South Africa through increasing level of cyber security
Haas, Michal
Topic of this diploma thesis is focused on cyber security situation in African Union particularly in South Africa looking and analyzing the legislative background of African Union and South Africa after introduction of African Union Convention on Cyber Security and Personal Data Protection. Legal background supported on continental level and governmental level should point on importance of this topic and encourage states bodies for action. Analysis and comments on legal aspects, suggestions and regulations introduced in the Convention together with practical examples from global environment and South Africa as well will point on opportunities in regional development consiting in this topic. In suggestion part is proposed Cyber Security Concept that is transferring general articles from African Union Convention into short guide with comments on ratified content by Member States of African Union, reviewing those points wirh our related topic and filling up missing parts based on experiences from European Union.
Analýza dopadu počítačových trestných činů na podniky
Belgoziyeva, Ulpan ; Pavlíček, Antonín (advisor) ; Böhmová, Lucie (referee)
Global networks enable businesses to operate beyond the geographical boundaries and to make their processes more efficient. However, with digitalization, there also comes threats for businesses and sometimes companies are underestimating the risks associated with cyber-attacks. As the topic is relatively new, there are not many studies that took a deep look at the impact of cyber-attacks on the businesses and analyze those impacts from different angles. The key objective of the thesis was to cover key aspects of the impacts that cyber crimes can have on businesses, taking into account the various types of cyber-attacks, no matter the size and the sector of activity in which the company operates. To achieve this, I used synthesis analysis of real cyber-attacks cases, and I have split each effect into various categories using classification analysis. Furthermore, to study deeply the consequences that cyber incidents can have on businesses, I have analyzed in depth two large corporations that have suffered such attacks, and I have interviewed 15 experts working in the field of cyber-security. This analysis helped to achieve a complete and segmented picture of the impacts that cyber incidents had on businesses and showed how significantly these could affect business.
Strategy for the development of education in the field of ICT security at universities
Sulanová, Monika ; Doucek, Petr (advisor) ; Korber, Karel (referee)
The thesis deals with the problems of education in ICT security experts at universities in order to design a strategy for the development of education in present degree courses that dealing with this issue. The theoretical part focuses on the definition of ICT security and to familiarize the reader with the basic concepts of information security management and management of cyber security and gives an overview of the overall development of ICT security and the current trends in this area. It also describes the current situation on the labor market in relation to ICT security and the education of professionals in this field and characterizes the existing recommendations for education in ICT security. Practical part focuses on analyzing the current education ic ICT security and on analyzing the knowledge and skills requirements of the labor market to professionals in this area. Defines the basic professional role and knowledge domains that should be covered by this role. In the analytical part they are evaluated current profiles of graduates Master's degree programs focused on this area in order to find gaps in the knowledge base of graduates based on the requirements of the labor market and the existing recommendations. The results of the analysis are input to define a strategy on education in ICT security, which gives basic recommendations on how to eliminate the shortcomings.
Assessment of cyber risk in the banking industry
Spišiak, Michal ; Teplý, Petr (advisor) ; Maršál, Aleš (referee)
There has never been more need to discuss cybersecurity related issues. We live in a world where criminals do not have to physically visit a bank to steal money from it, where elections results can be influenced by data breached from personal email accounts, where to win a war a country needs skilled cybersecurity specialists rather than powerful weapons and where patients do not get recommended treatment because a hospital is under a cyberattack. The financial industry as a backbone of any modern economy requires adequate protection against cybercrime. We discuss major cyber threats for financial institutions as well as possible protection methods. After that we introduce Basel II Framework for operational risk assessment and we evaluate data breach risk in an empirical analysis. 1
The Birth of Cyber as a National Security Agenda
Schmidt, Nikola ; Hynek, Nikola (advisor) ; Stevens, Timothy Charles (referee) ; Polčák, Radim (referee)
The following dissertation studies the question how cyber security has become a national security agenda and discusses implications of the observed processes to current international security status quo. I divided the research into three parts. The first part embodies theoretical and methodological approach. The second part studies three distinct discourses related to cyber security, the techno-geek discourse, the crime-espionage discourse and the nation-defense discourse using the method of Michel Foucault about archaeology of knowledge. The third part then draws on these three discourses and discusses implications through lens of several theoretical perspectives. Namely through concepts taken from science and technology studies, from actor network theory and network assemblages. The critical point of the research is a distinct reading of these discourses. While techno-geeks are understood as a source of semiosis, hackers' capability and crypto-anarchy ideology influenced by cyberpunk subculture, the cyber-crime and espionage discourse is read as a source of evidence of the hackers' capability. The inspiration in popular subculture is combined with current efforts in development of liberating technologies against oppression by authorities, oppression recognized by the eyes of the crypto-anarchist...
The potential improvement of the cyber security strategies
Jandura, Lukáš ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
The thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible. Powered by TCPDF (www.tcpdf.org)
The potential improvement of the cyber security strategies
Jandura, Lukáš ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
The thesis is focused on central nodes' dynamics in cyberspace, representing its key elements. This approach is derived from the theory of networks developed by Albert-László Barabási and applied on different aspects of cyberspace, which brings different views at known events and issues and discovers relationship between central and common nodes. Cyberspace is perceived in its broadest shape as a fluid result of social constructivism influenced by behaviour of its users. Final outcomes are summarised to recommendations for a new approach to a cybersecurity strategy. Powered by TCPDF (www.tcpdf.org)
The Conundrum of Cybersecurity: Concepts, Modalities and Threat Framing of the European Union
Rozsypal, Jakub ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
This thesis deals with the complex issue of cyber security in international relations, specifics of cyber realm due to its technical nature and particular circumstances of its development as well as with the way how the EU deals with information and communication technologies. Even though cyber security as a category appears with increasing frequency and intensity in the thinking on security and related political debate in the past twenty years, some of its basic tenets are still insufficiently understood. First part of the thesis deals with cyber realm and its specifics as such with effort to pinpoint some of the inherent contradictions between the traditional Westphalian nation states and the fluid character of the digital world. Through analysis of selected relevant incidents as well convincing absence of the "digital- doom" scenarios the peculiar expectation-reality discrepancy will be analysed. The overarching method departs from intersubjective securitization framework. In the last part analysing the EU it is the concept of threat framing that is applied to study and trace the narrative of the EU in these matters. Here a gradual construction of a narrative termed ICT as "fundamental societal building block" reveals itself with cyber related issues making its way into top policy levels through...

National Repository of Grey Literature : 133 records found   beginprevious107 - 116nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.