National Repository of Grey Literature 225 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Dopady epidemie COVID-19 na hospodaření a funkci obcí
Brožová, Jitka
The bachelor thesis deals with the impact of the Covid-19 epidemic on the management and function of municipalities. The search part describes the basic concepts related to this topic. In brief, the work mentions government measures that were taken in the spring months. The practical part is based on knowledge gained through semi-structured interviews with mayors. These were divided into three areas - economic, socio-political and information security. Before conducting the interviews, several hypotheses were established. These interviews were analyzed in the final part of the work. This research showed what problems the municipalities had to face during the first wave of the coronavirus crisis and what solutions each municipality used. The subject of the work is not the assessment of the progress of municipalities or the government. This issue can be assessed in the longer term.
Introducing compliance with the TISAX standard into the company
Tesařová, Tereza ; Marek, Chlup (referee) ; Sedlák, Petr (advisor)
Diplomová práce se věnuje implementaci shody se standardem TISAX ve společnosti působící v automobilovém průmyslu. Její první část uvádí teoretický podklad pro danou problematiku, druhá potom analyzuje současný stav. Následuje návrhová část, kde je zahrnuta samotná implementace i finanční zhodnocení pomocí ROSI modelu.
Information security management of small business
Nguyen, Hoai Nam ; Tran,, Manh Hung (referee) ; Ondrák, Viktor (advisor)
The aim of this bachelor's thesis is to analyse the company's ISMS and to propose certain measures based on the found shortcomings. The introductory part of the thesis focuses on a summary of the theoretical foundations in the field of information security, with the key element being the set of standards ISO/IEC 27000. The analytical part describes the current state of ISMS in a specific company. In the practical part, appropriate measures are selected according to the result of the analysis.
Deployment of a DLP solution in an energy company
Přikryl, Adam ; Veselý Jindřich, Ing., MBA (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with the assessment of the deployment of DLP solutions in an energy company with the consideration of transition to another supplier. The first part summarizes the theoretical background needed to understand the issues of data protection and DLP systems. The second part provides an analysis of the current state of the company. The third part presents a proposed solution, which is based on the theoretical background and analysis of the current state, includes a description of the systems, a proposal for switching to another supplier and an economic evaluation.
Economic impact of the implementation of a software tool for compliance with VKB in the corporate environment
Nováková, Natálie ; Svoboda Vlastimil, Ing., MBA (referee) ; Sedlák, Petr (advisor)
This thesis focuses on evaluating the economic impact of implementing a software tool for compliance with the Cybersecurity Decree (VKB) in a corporate environment. As part of the thesis, an analysis of available cybersecurity management tools was conducted, including a comparison of their features and functionalities. Based on the results of this comparison, a specific tool was selected that appears to be the most suitable. The output of this thesis is an economic comparison of the costs associated with each solution option.
Web Application for Evaluation of Security Testing Tools
Moravec, Vojtěch ; Lieskovan, Tomáš (referee) ; Ilgner, Petr (advisor)
The bachelor thesis focuses on the design, development, and implementation of an intentionally vulnerable environment in the form of a web application. The resulting web application encompasses vulnerabilities across categories outlined in the OWASP Top 10 project, specifically following its 2021 version. Through this application, it is possible to assess and compare automated tools for penetration testing, as well as tools for static code security analysis. The thesis is divided into five chapters. In the introduction, the OWASP Foundation, which oversees the OWASP project, is described. The analysis of selected intentionally vulnerable web applications is then presented. Subsequent chapters delve into the design of the custom intentionally vulnerable web application, detailing the technologies used in its development and outlining all vulnerabilities present in the application. In the conclusion of the thesis, testing of the resulting vulnerable application is conducted using the aforementioned tools, and a summary of the achieved results is provided. Apart from the aforementioned testing and comparison of automated tools in the fields of penetration testing and static analysis, the application can also be utilized for educational purposes. This is primarily facilitated by the attached fixes and explanations, which accompany each vulnerability within the application.
Information System Assessment and Proposal of ICT Modification
Linner, Marek ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
The thesis focuses on assessing the information system of a selected company and proposes ways to improve its capabilities. The introductory theoretical part of the thesis presents issues related to information systems, user interfaces, and information security. In the following chapter, analyses of the current state of the information system are elaborated. The third chapter identifies issues and suggests solutions. The final chapter evaluates the proposals from an economic perspective.
Preparing the company for the introduction of compliance for NIS2
Spišáková, Lenka ; Peter,, Smorada (referee) ; Sedlák, Petr (advisor)
The thesis addresses the issue of the newly emerging European NIS2 directive, which aims to increase cyber security in an organisation. The intention of the thesis is to implement compliance with the NIS2 directive into society. In the introductory chapter, the objectives of the thesis will be presented, followed by a description of the theoretical background and then an analysis of the current state of the project. The final chapter is devoted to the proposed solution of creating a risk analysis and the subsequent implementation of the proposal in the company.
Security testing of IPv6 family protocols and related vulnerabilities
Vopálka, Matěj ; Phan, Viet Anh (referee) ; Jeřábek, Jan (advisor)
This thesis discusses the Internet Protocol version 6 (IPv6), especially the secure deployment of the protocol. The thesis deals with the shortcomings of IPv4 protocol and reason of development of IPv6 protocol. It covers topics like IPv6 addressing, structure of frames, the initial types of IPv6 extension headers. Additionally, the thesis explores related protocols to IPv6, such as NDP, SLAAC, adn DHCPv6. The thesis provides an introduction to penetration testing, describes the basic types of hackers and gives a general overview of information security attacks. The practical part is devoted to the development of an application for automatic vulnerability testing of IPv6 networks Penvuhu6. The tool is developed in Python programming language using Scapy library. Penvuhu6 has been tested in an emulated network environment with the GNS3 program. Three test scenarios were developed for the tool focusing on testing the passage of repetitive and misaligned headers, overlapping fragments, and Router advertisement and DHCPv6 advertisement messages. Penvuhu6 was tested on an emulated RouterOS device with basic and restrictive configurations.
The Impacts of a Ransomware Attack: Risk Management and Implementation of the Minimal Security Standard
Syrovátková, Lucie ; Alena,, Rybáková (referee) ; Sedlák, Petr (advisor)
The aim of the thesis is to implement cyber security in a small company as a result of a suffered ransomware attack based on the requirements of the Minimal Security Standard, which is a support material for entities that are not regulated by the Cyber Security Act in the Czech Republic. The main goal is achieved through the three main parts into which the thesis is divided. The introductory part is a theoretical support for the remainder of the thesis and contains the main concepts and areas that are used in the thesis. The analytical part focuses on the description of a possible vector of a ransomware attack and its consequences. In the second part of the analytical chapter, the current situation of the company is assessed in comparison to the requirements of the Minimal Security Standard. The last part proposes specific security measures, creation of security policies adapted to the company's capabilities and an economic evaluation.

National Repository of Grey Literature : 225 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.