National Repository of Grey Literature 69 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Design of Chosen Parts of ICT Security
Zajíček, Juraj ; Papež, Václav (referee) ; Ondrák, Viktor (advisor)
This bachelor`s thesis is focused on the security of information and communication technologies in a particular company. This company is a branch office for the Slovak Republic and the Czech Republic. Specifically, it is about the proposition and management of the program for awareness and training in information security of the company. First part of the thesis contains theoretical informations about information security. In second part is the analysis of the current state of ICT technologies of the company. In last part is overall evaluation of the analysis and own suggestions for solutions. Last part also includes the concept of program management and specific suggestions for practical implementation.
Enterprise Information Security
Král, David ; Koch, Miloš (advisor)
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a company of any size and orientation. History of evolution of information security began particularly in environment of large organizations, that processed a large amount of data. It is logical that it was larger and richer companies which often have sufficient resources to invest in the security of their assets. Moreover, relatively large percentage of small and medium-sized businesses have about the security of its information somehow faulty ideas. More and more attackers are focusing on mid-sized organizations, which are insufficiently protected and they find it much easier to get to their sensitive data. Small and medium-sized companies are often preventing the implementation of certified standards. The reason is the fear of heavy formal administration, which is often required for certification, but is mainly for small businesses unnecessary and burdensome. For medium-sized organizations (50-250 employees), the certain administration associated with information security is a necessity. Employees, as in small businesses, are familiar with each other, but already there is a certain degree of anonymity, which may trigger the fact that some employees will not respect security procedures, especially if they are not precisely defined, and compliance will not be regularly checked. It depends on several circumstances, whether the certification is appropriate for the organization or the establishment of their internal methodology for information security. Methodology of balanced information security, which is the subject of this article is primarily proposed for small and medium-sized businesses. Its aim is to define the most important and absolutely necessary criteria for information security so that the system meets the requirements of a comprehensive solution of the issue. On the other hand, it seeks how to minimize the administrative burden for these organizations, which is, as mentioned above, one of the main reasons, why companies hold a negative attitude to the most widespread certifications. The methodology identifies four main areas of information security management system in a company. It includes an audit which specifies the quality level of particular areas of information security in the organization. If any of the studied areas is found insufficiently protected, effecitve measures are offered to improve the situation. The ultimate solution is a condition of a system where all the key areas of information security management of the organization are at the appropriate level and the system can be considered balanced.
Implementation of ISMS in a Company
Pospíchal, Jindřich ; Jordán, Vilém (referee) ; Sedlák, Petr (advisor)
The master’s thesis is aimed at proposing an implementation of information security management system in a company. It covers basic theoretical background and concepts of information system security and describes standards of ČSN ISO/IEC 27000. Specific provisioning of ISMS is then proposed based on the theoretical background and analysis of current state.
The proposal for implementation of essential ISMS sections at the public administration
Klepárník, Roman ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis focuses on the application of information security management system in the public administration. Thesis focuses on the most frequent threats on information security and describes the best practices which are compliant with the ISO/IEC 27000. It contains the proposal of security recommendation that will help the organisation with ensuring better information security and with the preparation for GDPR
System for Audit Support of Information Security Management
Soukop, Tomáš ; Květoňová, Šárka (referee) ; Kreslíková, Jitka (advisor)
This master thesis describes creation of system for audit support of information security management. In the next chapters I will explain what is the information security, system of information security, audit system and what standards we have for this. Last but not least is described how to create a system for audit support. The whole design is created with usage of standards for quality management and information security management. System is oriented for web environment.
Design and Deployment of Information Security Management System in Educational Center
Křížová, Romana ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This Master´s thesis is focused on the security of Educational center running a research aimed at chemical industry. In the first part the theoretical basis followed in the field are defined. The practical part is based on the security of a property considering the technical aspects as well as the suggestions of the trainings of managers and employees and sets respective permissions. A guide price calculation is also essential this project. The practical part evolves the existing analysis of the property.
Information security as one of the performance indicators in energy company
Kubík, Lukáš ; Svoboda, Vlastimil (referee) ; Sodomka, Petr (advisor)
Master thesis is concerned with assessing the state of information security and its use as an indicator of corporate performance in energy company. Chapter analysis of the problem and current situation presents findings on the state of information security and implementation stage of ISMS. The practical part is focused on risk analysis and assessment the maturity level of processes, which are submitted as the basis for the proposed security measures and recommendations. There are also designed metrics to measure level of information security.
Smart Home Security Management
Valičková, Monika ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This diploma thesis is focused on increasing Smart Home Control System security in terms of information, network and physical security. It is based on a risk analysis of the current state of applied security management and the needs of the house owner. Both security countermeasure and cost analysis are thoroughly discussed, and the thesis also contains methodology, which describes the management of smart home security and improvement of end-user security awareness.
Web Browser Extension Providing Protection of Company Data
Dvořák, Jan ; Bednář, Martin (referee) ; Polčák, Libor (advisor)
This thesis focuses on securing company data stored in SaaS storage. In contrast to data stored on-premise, data stored in the cloud face several additional risks, be it from the outside as well as from the inside of the organization. The main risk, whose impacts we try to mitigate in this work, is an accidental data leak by one of the organization's employees. An extension for the Google Chrome web browser was designed and implemented as a solution to this issue. Implementation complications rising from transitioning to a new version of the manifest are also examined in part of this work. The thesis is concluded with the execution of experiments simulating practical data loss scenarios and a verdict on whether a web extension is an appropriate means for creating a tool providing data loss prevention capabilities.
Web Browser Extension Providing Protection of Company Data
Dvořák, Jan ; Bednář, Martin (referee) ; Polčák, Libor (advisor)
This thesis focuses on securing company data stored in SaaS storage. In contrast to data stored on-premise, data stored in the cloud face several additional risks, be it from the outside as well as from the inside of the organization. The main risk, whose impacts we try to mitigate in this work, is an accidental data leak by one of the organization's employees. An extension for the Google Chrome web browser was designed and implemented as a solution to this issue. Implementation complications rising from transitioning to a new version of the manifest are also examined in part of this work. The thesis is concluded with the execution of experiments simulating practical data loss scenarios and a verdict on whether a web extension is an appropriate means for creating a tool providing data loss prevention capabilities.

National Repository of Grey Literature : 69 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.