| |
| |
| |
|
Implementing security policy in the company
Techlovský, Stanislav ; Čermák, Igor (advisor) ; Čelikovská, Martina (referee)
The aim of this diploma is description of the design of information security management system for the company implementing the international standards ISO/IEC 27000. The theoretical part deals with standards of ISO/IEC 27000 as well as practical guide for im-plementation into the information security management system in the company. Following part describes the current status of the security status of the company. The practical part analyzes the data collected from previous part on the basis of which is a copy of the draft introduction of information security management system in the company.
|
|
Proposal for the ISMS Implementation in Company with CI Support
Šebrle, Petr ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the methodology of Management of Information Security in a medium size company supporting critical infrastructure. The first part is focused on the theoretical aspects of the topic. Practical part consists of analysis of the current state, risk analysis and correction arrangements according to the attachment A of standard ČSN ISO/IEC 27001:2014. Implementation of ISMS is divided into four phases. This thesis however covers the first two phases only
|
|
Design Methodology of Security Awareness at the Secondary School
Sobotková, Hana ; Potůčková, Marie (referee) ; Sedlák, Petr (advisor)
The diploma thesis addresses the topic of security awareness education at secondary schools. The goal is to develop a standardized methodology for building security awareness, which can be used by secondary schools to ensure the protection of their perimeter, their users and others from the user’s actions. The introductory part deals with the basic terminology, existing and forthcoming Czech and international legal acts, norms, regulations and certification in the area of information and cyber security. The practical part includes the methodology chapters describing the building of security awareness at secondary schools.
|
|
Design of Industrial Solutions ISMS
Havlík, Michal ; Popelář, Ondřej (referee) ; Sedlák, Petr (advisor)
Thesis deals with industrial solutions of ISMS mainly network infrastructure. First introduction into theoretical background of the thesis. Further analysis of the current situation in the company and its evaluation. Consequently, the design of solution done to meet the standards of ISO / IEC 27000.
|
|
Design of Methodology for Implementation of ISMS
Dokoupil, Ondřej ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This master’s thesis deals with the design of methodology for implementation of ISMS (Information Security Management System). The theoretical part describes the basic principles and procedures for processing of this domain, including normative and legal - legislative aspects. The next section is an analysis of the current state of the organization. On its basis the practical part is drafted, including an economic evaluation of the project and possible benefits of implementation.
|
|
The Information Security Management in Company
Kalabis, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This master thesis is focused on the design of implementation the information security management system in the company according to standards ISO/IEC 27000. First of all, it was described the theory of information security management system and it was explained the relevant terms and other requirements in the context of this issue. This assignment involves analysis of the current situation of the company and suggestions that lead to reducing discovered risks and bring improvement of the general information security.
|
|
Implementation of New Terminal Nodes to the Company and it’s Management
Lukeš, Pavel ; Šumbera, Tomáš (referee) ; Ondrák, Viktor (advisor)
This thesis deals with analysis of company’s MBG, spol. s r.o. problems, following with teoretical basis for these problems and in the end, it suggests the solutions. These problems are insufficient monitoring, any of used technology are old and absent of any information security management system. The first part is focused on a teoretical basis for the described problems, the second part will completely analyze all mentioned problems of a company. Final part will contain a solution for every company’s problem, based on theory and analysis with taking care about company’s demand too.
|