|
Design Methodology of Security Awareness at the Secondary School
Sobotková, Hana ; Potůčková, Marie (referee) ; Sedlák, Petr (advisor)
The diploma thesis addresses the topic of security awareness education at secondary schools. The goal is to develop a standardized methodology for building security awareness, which can be used by secondary schools to ensure the protection of their perimeter, their users and others from the user’s actions. The introductory part deals with the basic terminology, existing and forthcoming Czech and international legal acts, norms, regulations and certification in the area of information and cyber security. The practical part includes the methodology chapters describing the building of security awareness at secondary schools.
|
| |
| |
|
POF Base Network Infrastructure Design
Toth, Lukáš ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This bachelor’s thesis presents the design of a computer network for a new building of company RENISHAW s.r.o.. The first part is focused on theory and general information from the area of computer networks. In the second part is defined problems, describes the current situation and the requirements of the investor. The third part includes the design project of new computer network, which is created on the investor's requirements, a description of the materials and a calculation of the implementation costs.
|
|
The web application design for risk analysis
Krýzová, Lenka ; MBA, Vlastimil Svoboda, (referee) ; Sedlák, Petr (advisor)
The master's thesis is focused on the design of a web application which aims at facilitating maintenance of the organization information security management system. The theoretical part of the thesis includes an explanation of the used methods and programming principles. The analytical part defines the current state and the environment of the organization. The design part describes the web application development and integration process, represents an operating manual and financially evaluates application development and maintenance.
|
|
Basics of security awareness for pupils at primary school
Přibyl, Aleš ; Kolajová, Jana (referee) ; Sedlák, Petr (advisor)
This diploma thesis looks at building educational modules that will serve to build a basic awareness of safety for children in primary schools. The theoretical part describes the basic information from this area. The next part describes the assignment of individual modules and also describes the schools where the teaching took place. The practical section contains detailed fillings of these education modules.
|
|
Acquisition of email communication security service according to ISMS
Foltýn, Adam ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The diploma thesis focuses on a proposal of acquisition of email communication security service according to ISMS for a company which provides trading services on financial markets. The thesis is divided into three parts. In the theoretical part, necessary terms and theoretical essentials are explained in order to ensure understanding of the following parts of the thesis. The following analytical part describes the company's current security status of information. As a solution in the final part of the thesis, partial risk analyses are conducted. Based on these, suitable options for email communication security measures are proposed as well as their the economical evaluation.
|
|
Design for ITSM implementation with the use of the ITIL framework focusing on security
Antalík, Dominik ; Foss, Stanislav (referee) ; Sedlák, Petr (advisor)
The diploma thesis solves proposals for improving the quality of providing IT services and their optimization in the interest of the company and its business goals. For the needs of user-friendly IT services with optimized cost, the processes, functions, roles of employees and technology need to be a benefit for the business. By adopting and adapting the ITIL framework, it will be possible to increase the efficiency and effectiveness of providing IT services, to clearly define the IT service management and to define the main processes with the relevant objectives. The ITIL framework uses best practices that have been successfully used in other organizations. Practically proven processes, improved service quality and long-term optimization with continuous improvement offer cost-cutting potential. ISO/IEC 27013:2015 provides guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 200001 will be helpful in maintaining the integrity of the current information security management system with the design of IT services management.
|
|
ISMS Implementation Status Assessment
Černoušek, Robin ; Veselý Jindřich, Ing., MBA (referee) ; Sedlák, Petr (advisor)
Bachelor's thesis deals with the issue of information security management system and evaluation of the current state using a created tool. The theoretical part contains the basic principles and concepts of the whole work. The chapter on the analysis of the current state introduces the organization and describes the current state of its information security management system. The actual design of the solution is a tool in the form of an Excel spreadsheet, which will allow an analysis of the current state of the ISMS implementation level in the company.
|
|
Design of a Company Computer Network
Dobeš, Marek ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This bachelor's thesis describes the design of computer networks. It´s based on an analysis of the building where the network will be implemented and there are also specified the specific actions and elements to be used in implementation. It also includes technical documentation and costing of the implementation of this computer networks.
|