National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Vulnerability Reports Analysis and Management
Domány, Dušan ; Toropila, Daniel (advisor) ; Galgonek, Jakub (referee)
Various vulnerabilities in software products can often represent a significant security threat if they are discovered by malicious attackers. It is therefore important to identify these vulnerabilities and report their presence to responsible persons before they are exploited by malicious subjects. The number of security reports about discovered vulnerabilities in various software products has grown rapidly over the last decade. It is becoming more and more difficult to process all of the incoming reports manually. This work discusses various methods that can be used to automate several important processes in collecting and sorting the reports. The reports are analyzed in various ways, including techniques of text mining, and the results of the analysis are applied in form of practical implementation.
Information systems security
Domány, Dušan ; Tykal, Jaroslav (advisor) ; Dokulil, Jiří (referee)
Present work studies di erent aspects of information systems security. It describes the information security goals, the designing process of the information system security, most common forms of risks and some basic methods of protection against them. Through the enclosed program it is possible to try out to design security of information system for an imaginary company and test this design through a simulation. The work contains description of this program including user guide, con guration les description, program structure and a short example of use.
Vulnerability Reports Analysis and Management
Domány, Dušan ; Toropila, Daniel (advisor) ; Galgonek, Jakub (referee)
Various vulnerabilities in software products can often represent a significant security threat if they are discovered by malicious attackers. It is therefore important to identify these vulnerabilities and report their presence to responsible persons before they are exploited by malicious subjects. The number of security reports about discovered vulnerabilities in various software products has grown rapidly over the last decade. It is becoming more and more difficult to process all of the incoming reports manually. This work discusses various methods that can be used to automate several important processes in collecting and sorting the reports. The reports are analyzed in various ways, including techniques of text mining, and the results of the analysis are applied in form of practical implementation.
Information systems security
Domány, Dušan ; Dokulil, Jiří (referee) ; Tykal, Jaroslav (advisor)
Present work studies di erent aspects of information systems security. It describes the information security goals, the designing process of the information system security, most common forms of risks and some basic methods of protection against them. Through the enclosed program it is possible to try out to design security of information system for an imaginary company and test this design through a simulation. The work contains description of this program including user guide, con guration les description, program structure and a short example of use.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.