National Repository of Grey Literature 78 records found  beginprevious69 - 78  jump to record: Search took 0.00 seconds. 
Draft of company IS/IT security policy.
Kuliš, Ota ; Princová, Irena (referee) ; Ondrák, Viktor (advisor)
The presented bachelor's thesis analyses problems of IS/IT security in the factual environment of a middle-sized Czech company and suggests a solution to these problems and its practical implementation. Taking into account the scope of security issues, the thesis is focused on the company security policy.
IS/IT security policy management scheme for Top Moravia Q, s.r.o.
Šipka, Ondřej ; Vaněček, Petr (referee) ; Ondrák, Viktor (advisor)
This thesis deals with evaluation of current security status of information systems and technologies in a given company. It determines optimal solution of analyzed security risks and creates IS security policy.
Company´s Security Policy
Novotná, Ivana ; Hlavenka, Jiří (referee) ; Ondrák, Viktor (advisor)
Presented Bachelor’s thesis comprehensive analyses problems of IT security of concrete Czech company medial size and suggests integrated solution of this sphere including practical implementation at the same time. According to the extent of problems I choose section of company’s security policy.
Implementation of computer network to relax center
Nejezchleb, David ; Khateb, Ahmad (referee) ; Ondrák, Viktor (advisor)
This work provides a proposal for a computer network and camera system in a relaxation centre at the request of the operator of the centre.
Synchronization and Backup of Data under Android OS
Karmazín, Jaromír ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Tato práce zkoumá existující synchronizační aplikace a další nástroje vhodné pro tvorbu synchronizačního nástroje, z nichž následně vybírá vhodné metody pro tvorbu nového nástroje pro operační systém Android. Vytvořený nástroj je schopen synchronizovat uživatelské soubory v peer-to-peer sítích nad IPv4 i IPv6, přičemž spolupracuje s analogickými nástroji v operačních systémech Linux a Windows. Nástroj využívá sledování verzí založené na Gitu a zabezpečení komunikace pomocí TLS.
Design and Realization of a System for Masking Dispatcher PC Cut-Off by Backing-Up Data Obtained from TAMRON Weighing-Machine
Štulír, Vojtěch ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
In the productive operation any kind of plant is undesirable due to failure of system that all production has been stopped. Therefore, different security and backup devices that covered those failures are being developed and used.   This thesis describes vulnerabilities in the real operation which are important for treatment and reduce the risk of failure in the whole production. Here is analyzed problem dispatching computer failure and its solution using a module for covering failure. The function of module consists in backup during failure, their sending and treating them after system failure removal.  Gradually described, there is an analysis of the system and place the module into their architecture. After all details follow description of module development from design through implementation to deployment and testing in reality.
Rating of Security Business Informations
Veselý, Martin ; Nohel, Oto (referee) ; Dvořák, Jiří (advisor)
The thesis ”Rating of security business information” is focused on creating metrics in order to assess security of an information system of the company Tech4sec, spol.s.r.o. Risks of the information system and their impact on economy of the company are elaborated by application of the created metrics. To build the part of IS/IT strategy of the company that leads to elimitation of the risks found is dealt with in the thesis as well.
A guide to designing optimal method of backup for big volumes of data
Bartoňová, Veronika ; Vychodil, Petr (referee) ; Burda, Karel (advisor)
This diploma thesis deals with backup for big volumes of data. Data backup is a overlooked area of information technology and the data can be lost by trivial user error or breakdown on any components. In this thesis is discussed theory of backup - archive bit and his behavior based on various type of backup (full, incremental, differential or combination thereof), duration and frequency of backups or the point of ultimate recovery. In addition there are mentioned rotation schemes Round-Robin, GFS and Tower of Hanoi, where are described their principles and graphic diagram of rotation. In chapter Strategy of backup describes the backup strategy via choosing the right choice, taking into technical and economic parameters. Impact analysis, which is explained also in this chapter, describes the important moments in data recovery. For select the optimal strategy is necessary to consider not only the whole capacity of the backup data, but also the size of the backup window for data storage or storage location. In chapter Media storage you can acquainted with all backup media and their technical parameters that are available on the market and can be used for data backup. In section Guide methodology of large volumes of data backup is designed a backup plan with the necessary inputs for the actual implementation of the backup. The design methodology puts emphasis on regular backups and check their location. On practical demonstration is shown that the rotation scheme Tower of Hanoi are among the smallest need for backup media. A part of this thesis is also design of methodology for backup small amounts of data.
Digital safety and security in the curriculum of primary and secondary schools
KOVÁŘ, David
The bachelor thesis deals with teaching digital security issues with an emphasis on the content and range. The actual issue of digital security is extensive and therefore that range of information was defined on selected teaching areas of backup datas using software security features, safe behaviour on the internet including the management of passwords and security issues of copyright law. The theoretical part of Bachelor thesis is based on the analysis of educational programmes of selected schools. The Bachelor thesis also includes an analysis of curricular documents due to the issues and processes necessary range of information and data dedicated to selected area of digital security. The main aim of Bachelor thesis is the comparison of selected educational programmes where focus will be on finding significant differences in the described digital-security issues. Everything will be verified and implemented by interviews with students and teachers of the selected school. Acquired data and information from students along with school and framework educational programmes will generate set of information representing the current state of teaching digital security and the differences between high school, grammar school and elementary schools.
Data security of the fire department of the South Bohemian region
REMIÁŠ, František
The thesis is focused on work with the data and information for the Fire and Rescue Service of South Bohemia Region, and its goal is to determine whether the data and information faced by members and employees of Fire and Rescue Service in their work are treated in accordance with applicable legislation, and whether they are adequately secured and protected against misuse and loss. Based on the organizational structure of qualitative research are mapped in detail the security and protection of data on individual departments and workplaces. These information compile risk areas for different types of data and due to this is prepared the risk map for these areas. Due to the findings the specific measures are designed to mitigate the risks for certain fields of work with data and information. The first part explains the basic concepts and definitions of words data, information and knowledge. The next section discusses the historical context of the mapped datastorage and handling of data in paper and electronic form, including the development of information systemsand technologies. Further are described the possible threats by varius effects on these data. Another chapter focuseson describing the current state ofwork with data and description oftechnologies used to it at the Fire and Rescue Service. Afterwards is elaborated an organizational structure focused on work with data. In following part the risk map is prepared for each area and proposesseveral solutions and particular measures to reducethe greatest of the resultingrisks. The benefit of this work is the implementation of several specific solutions to eliminate and reduce the threat of risks when working with dataat Fire and Rescue Service of South Bohemia Region, and several otherproposal measures and stepsfor additional security and data protection.

National Repository of Grey Literature : 78 records found   beginprevious69 - 78  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.