National Repository of Grey Literature 126 records found  previous11 - 20nextend  jump to record: Search took 0.02 seconds. 
Draft Recovery Plan for the infrastructure of the Faculty of Business and Management
Srnec, Jan ; Kubek, Ján (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the proposal of a “Disaster Recovery Plan” for the Informatics department at BUT’s Faculty of Business and Management. The first part consists of theoretical basis of crucial parts of disaster recovery plan, which is the very foundation for the proposal itself. The second part follows up with a description of the server room of the Informatics department, in particular its IT equipment. The third part deals with the very disaster recovery plan proposal which will function as a school code regulation and a foundation for a Business Continuity Management System document.
The Implementation of ISMS in a Small Company
Svoboda, Milan ; Vlastimil,, Svoboda (referee) ; Sedlák, Petr (advisor)
The diploma thesis focuses on proposing an information security management system (ISMS) in a small company. This publication includes theoretical facts, which are needed to understand and design a ISMS. The design proposal of the ISMS itself is based on an analysis of the current status of the company's information security. The proposed security measures are based on the actual state of information security within the company, and on recommendations stemming from the ISO/IEC 27000 standard.
GAP analysis of information security management system
Konečný, Martin ; Tomáš,, Krejčí (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on GAP analysis of information security management system. The thesis consists of theoretical, analytical and practical part. The first part discusses the theoretical background of the issue of information and cyber security. The analytical part describes the current condition of the researched company. The thesis’s output is the draft of risk register and draft of security countermeasures implementation. The draft targets on countermeasures leading to increase information security in company.
Automation of a Red Team in KYPO cyber range
Boháček, Milan ; Drašar Martin, RNDr. Ph.D (referee) ; Sedlák, Petr (advisor)
Tato diplomová práce zkoumá možnost automatizace činností červeného týmu při tréninku v kybernetické aréně. Práce obsahuje zhodnocení současného stavu v oblasti automatizace červeného týmu a penetračního testování a následně představení nástroje, který lze využít právě pro automatizaci činností červeného týmu při cvičeních kybernetické bezpečnosti.
Creating a help desk SW tool for cyber security management
Brzobohatá, Veronika ; Svoboda Vlastimil, Ing., MBA (referee) ; Sedlák, Petr (advisor)
The diploma thesis is focused on the creation of a helpdesk design for ESKO software. This ESKO software was developed by ISIT Slovakia s.r.o. The helpdesk will be represented by several software. Some are used to create diagrams and represent workflows, others for graphic editing. The helpdesk will be created based on the current needs of the company and then delivered to it as the final product. The main goal is to extend the functionality of an existing website and add to this website and the proposed helpdesk. The bonus will be a query library, which should work on the principle of an SQL database.
5G network – how will it change our lives?
Ondriska, Josef ; Rujbrová, Šárka (referee) ; Jašková, Jana (advisor)
Tato bakalářská práce popisuje koncept páté generace bezdrátových systémů a diskutuje její hlavní přínosy i rizika. Práce uvádí stručný přehled vývoje mobilních komunikačních sítí. Popisuje funkci každé generace a uvádí její vlastnosti. Dále popisuje koncept 5G sítě, uvádí její parametry a klíčové faktory, které vedly k jejímu vzniku. V další části se práce věnuje internetu věcí, uvádí jeho historii a možné uplatnění společně se sítěmi 5G. Jmenuje nejrůznější oblasti využití a definuje, jak bude společnost z této technologie těžit. Závěrem se práce zabývá možnými hrozbami, ať už jde o lživé informace, nebo skutečná rizika jako jsou negativní dopady na lidské zdraví či bezpečnost s ohledem na osobní vlastnictví.
Assessment and a Proposal for Information Security in the Organization
Rybáková, Alena ; Šarbort, Jakub (referee) ; Ondrák, Viktor (advisor)
This diploma thesis deals with the issue of information security in the organization. Author's effort is to gain a broad overview of connections, which will then be evaluated in the final section, providing concrete recommendations. In this thesis it is discussed information security management system, service management system and cyber security, both in theory and in terms of real application in a particular organization. The aim is to provide own recommendations for improvement.
Methodology of a security audit
Kroupová, Hana ; Hana,, Sobotková (referee) ; Sedlák, Petr (advisor)
The master‘s thesis is focused on security audit. The aim of this thesis is to create methodology, which might help with creating security audits and research current condition of cybernetic and information security in a business establishment. Theoretical part explains basic terms and concepts about cyber and information security. Own interpretation consist description of methodological areas of security audit.
Security risks according to ISO 27001
Doubková, Veronika ; Oujezský, Václav (referee) ; Horváth, Tomáš (advisor)
This diploma thesis deals with the management of security information, according to ISO/IEC 27005 and it is implementation in the Verinice software environment. The risk information management process is applied to a critical infrastructure, that is connected to a optical fiber network. The work focuses on incidents aimed at threatening data from optical threats and active network elements in transmission systems. The result of the work is defined as a risk file in the .VNA format containing identified risks, for which appropriate measures are implemented in connection with the requirements of ISO/IEC 27001, for the protection of critical infrastructures and transmitted data in the transmission system.
Application of graph databases in cybersecurity
Tichý, Dušan ; Daniel,, Tovarňák (referee) ; Sedlák, Petr (advisor)
This bachelor thesis is aimed at introducing and proposing the use of graph databases in the field of cyber security, specifically in the area of phishing emails.

National Repository of Grey Literature : 126 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.