National Repository of Grey Literature 128 records found  beginprevious97 - 106nextend  jump to record: Search took 0.01 seconds. 
Rating of Security Business Informations
Veselý, Martin ; Nohel, Oto (referee) ; Dvořák, Jiří (advisor)
The thesis ”Rating of security business information” is focused on creating metrics in order to assess security of an information system of the company Tech4sec, spol.s.r.o. Risks of the information system and their impact on economy of the company are elaborated by application of the created metrics. To build the part of IS/IT strategy of the company that leads to elimitation of the risks found is dealt with in the thesis as well.
Mandatory access control
Grepl, Miroslav ; Soumar, Michal (referee) ; Pelka, Tomáš (advisor)
This master's thesis describes the problems of SELinux, and the methods of creation of a proper security policy with a focus on the SELinux reference policy and its mechanisms. It designs the methodics of formulation of specific security rules, supplemented with the practical example of its application. Furthermore, it describes the available security rules commonly used for http, ftp and ssh services securing, their modification and practical utilization. According to the proposed methodology, these services are protected with their own security rules and both security methods are mutually compared and evaluated.
Lebanon and the war in Syria (2011-2015).
Samadová, Jana ; Eichler, Jan (advisor) ; Novotná, Yvona (referee)
This thesis aims to analyze the impact of the war in Syria on the political and security situation in Lebanon. In its first part, it offers a Lebanese historical overview, a presentation of the circumstances of the Lebanese civil war and an analysis of the relations between Lebanon and Israel, Iran, Saudi Arabia and the Gulf countries, France, the European Union and the United States. In its second part, this work focuses on Syria: a summary of the facts that led to war in 2011, the development of this war, the creation of the Islamic State of Iraq and the Levant and finally an evaluation of the international interventions in said conflict. The last part is dedicated to the development of the Lebanese and Syrian relations, the evaluation of the security policy in Lebanon and the difficulties of the immigration crisis in that country.
Contemporary security policy of the United States towards China
Sechovský, Matěj ; Dubský, Zbyněk (advisor) ; Eichler, Jan (referee)
The subject of this thesis is the security policy of the USA towards China during the presidency of Barack Obama. The aim of this thesis is to contrast this policy with the neorealist school of International Relations and analyse its impact on US-China political and military relations. The thesis uses the National Security Strategy of 2010 and 2015, other governmental policy announcements, and puslished works of former advisors and experts.
Application of the act and subsequent regulation on cyber security at state administration´s offices
Pech, Jan ; Čermák, Igor (advisor) ; Jícha, Karel (referee)
The thesis is focused on the Czech act no. 181/2014 Sb., on cyber security and subsequent regulations, introduces origin and importance of act, defines the state administration´s office which identifies important information systems according to regulations, and subsequently thesis detailed analyses act and regulation on cyber security in relation to the defined state administration´s office. Keynote of this thesis is show the real application of identified obligations of the act and regulation to the defined state administration´s office, especially a design, implementation and management of organizational and technical security measures, including the evaluation of real impact on information security. To achieve the set goals author of this thesis uses the analysis of legislation, and draws own conclusions from author´s position of a security technologist who actively participated in the design security policy, and implementation and management of security tools. The benefit of this thesis is complex overview of the security employees work at defined state administration´s office, overview of the real fulfilment obligations of the act and regulation of cybernetic security, and ultimately this thesis brings ideas for further development of technical security tools. This thesis can brings benefit to other important information systems administrators as a set of processes, proposals and recommendation for their own information security management system. This thesis is structurally divided into four main parts. The first theoretical part introduces origin, importance and impact of the act on state and private organizations. The second analytical part analyses act and subsequent regulations in relation to the defined state administration´s office. The third practical part shows the real application of organizational and technical security measures. The fourth last part evaluates the real impact of measures on information security.
Defense against social engineering attacks
Škopec, Antonín ; Sigmund, Tomáš (advisor) ; Šimek, Luděk (referee)
This theses concerns with social engineering and defense against it. Social engineering attacks represents significant threat for organizations and their information systems, especially because they target weakest link in information systems security, its users. That way attacker can easily bypass even highly sophisticated security system. This theses tries to deal with question, how to effectively secure human factor of information system.
Evaluation of preparedness of a business for an implementation of ISO 27001 using Gap analysis
Zrcek, Tomáš ; Čermák, Igor (advisor) ; Šašek, Jaroslav (referee)
The aim of the thesis is to evaluate the preparedness of an information security management system (ISMS) in a logistic company JASA s.r.o. for a certification by standard ISO/IEC 27001:2013. This enterprise oscillates between small and medium enterprise. It has already implemented the certificate on quality management ISO 9001:2008. For this reason, in the thesis there are presented advantages for a company that already has implemented one of ISO standards and decides to implement another. First of all, the present state of information security management system in Jasa s.r.o was compared to other businesses functioning in the Czech and European market. Then the company control environment was evaluated accordingly to the requirements of standard ISO/IEC 27001:2013. Furthermore, a scheme was created in order to evaluate specific controls based on the impact risk that could arise in case of ignoring the suggested recommendations. In the last part, the controls were evaluated accordingly to difficulty, so that the company can find cheap and fast solutions with adequate impact. The main contribution of the thesis is the evaluation of the approach to solve information security in one of many enterprises that are afraid or are starting to notice the increasing amount of security threats. This approach may be chosen by other companies that decide to go the similar way.
Security politics of France during the presidency of Nicolas Sarkozy
Petričková, Soňa ; Eichler, Jan (advisor) ; Dubský, Zbyněk (referee)
The neoralism has been chosen as theoretical basis for the thesis. First part is describing and analyzing changed in national security of France during the presidency of Sarkozy in the new defense doctrine. Another part is analyzing in depth the return of France to NATO military commandment as one of these changes, as well as the example of french reponse to international security menace.
Security policyes of SELinux for selected application in Gnome environment
Sládek, Michael ; Palovský, Radomír (advisor) ; Vadinský, Ondřej (referee)
The goal of this work is creation of SELinux security policy for selected application. To achieve this goal is this work divided to several parts. The first part is presentation of basic security principles, on which SELinux is based and then presentation of structure of the SELinux itself. The second part is analysis of the degree of support of SELinux in some selected, user favorite, distributions of Linux. In the last part is, on the specific application, presented process of creation of SELinux security policy. Specifically, remaking of document browser Evince into secure browser of untrusted documents. The contribution of this work is to create a working policy for application Evince for GNOME user environment and mapping the extent of SELinux support in selected Linux distributions.
The Bulgarian involvement in NATO (1995-2014)
Marvan, Jiří ; Eichler, Jan (advisor) ; Dubský, Zbyněk (referee)
The thesis deals with the topic of the Bulgarian foreign and security policy in the post-communist era. The theoretical part is focused on the neo-realistic concept of security, as well as the terms security policy and the matters regarding the alliance formation. In the context of European post-socialist countries and their integration with the European and Trans-Atlantic alliances, Bulgaria occupies, due to the traditional historically justified warm relations to Russia, a unique position. Another important component of this unique process is the balkanization of the Bulgarian foreign policy which concentrated on the relations with the neighboring countries -- Greece, Turkey, Romania, Serbia and the Republic of Macedonia -- at the expense of the westernization. Therefore, the attitude towards the neighbors and the relations to them with regard to their respective historical and cultural background are included as well. Only after taking into account the Balkan circumstances it is possible to study the process of the Bulgarian voyage to the full membership in NATO and the revision of the Bulgarian doctrinal documents connected with it. The thesis closes with a thorough analysis of the Bulgarian participation in out-of-area operations in Cambodia, Bosnia and Herzegovina, Kosovo, Afghanistan and Iraq including in addition to general information about these missions themselves.

National Repository of Grey Literature : 128 records found   beginprevious97 - 106nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.