National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Project of Client-based VPN Remote Access Solution for the worldwide Retail Business Company in the region of Central Europe
Ondrák, Richard ; Havlín, Petr (referee) ; Kříž, Jiří (advisor)
The aim of this Thesis is to project and describe new Client-based Remote Access Solution for the Tesco Stores retail company in the region of Central Europe. Based on facts that the all present Tesco’s Remote Access Systems have not any longer met the increasing requirements and needs of corporate users and suppliers it is clear that the main scope is to find and implement such Solution that will meet and exceed all requirements. The main Project Aspects are to be the ease of use, security of the solution, unexacting administration of the system and user groups, and one unified Solution for the all Countries from the region of Central Europe that is suitably integrated in the Tesco IT infrastructure.
Project of Client-based VPN Remote Access Solution for the worldwide Retail Business Company in the region of Central Europe
Ondrák, Richard ; Havlín, Petr (referee) ; Kříž, Jiří (advisor)
The aim of this Thesis is to project and describe new Client-based Remote Access Solution for the Tesco Stores retail company in the region of Central Europe. Based on facts that the all present Tesco’s Remote Access Systems have not any longer met the increasing requirements and needs of corporate users and suppliers it is clear that the main scope is to find and implement such Solution that will meet and exceed all requirements. The main Project Aspects are to be the ease of use, security of the solution, unexacting administration of the system and user groups, and one unified Solution for the all Countries from the region of Central Europe that is suitably integrated in the Tesco IT infrastructure.
Examination of an organization's process maturity
Havlín, Petr ; Řepa, Václav (advisor) ; Pálka, Jan (referee)
This diploma thesis is dedicated to the examination of maturity levels of the rescue service of the central bohemian region. Furthermore to using the results of the examination to formulate recomandations in order to ease possible effort of the management to introduce approaches of the process management into the organization. Levels of maturity are examined by the factors identified by Mike Hammer in his PEMM (Process and Enterprise Maturity Model) model. Whole document is logically divided into four parts. The first part consists of detail description of the organization from three different angles. Purpose of the organization, strategic goals of the management and the organizational structure. Second part includes global and detail business process models created by the MMABP (Methodology for Modelling and Analysis of Business Process) by prof. Ing. Václav Řepa Csc. The models are created in the BPMN (Business Process Modelling Notation) and Eriksson-Penker notation. There are also included process interfaces and object lifecycles in the second part. Third part is where the comparison of described reality and the PEMM model factors of maturity is being made. All the maturity levels of the factors are argumented here as well. In the last part of this document, there is a presentation of the recomandations concluded from the previous comparison.
State of internetbanking and its security in the Czech republic and the rest of the world
Havlín, Petr ; Matuštík, Ondřej (advisor) ; Exnarová, Anna (referee)
Práce se zabývá analýzou stavu služeb internetového bankovnictví v ČR a ve světě. Seznamuje čtenáře s bezpečnostními prvky, které jsou v tomto odvětví využívány a s rozsahem funkcí, které aplikace jednotlivých bank nabízejí. Jsou popsány hlavní způsoby, které jsou použity pro šifrování přenosu dat po nezabezpečené síti Internet. Obsaženy jsou jak metody založené na symetrických, tak asymetrických klíčích. Pozornost je věnována i některým typům útoků, které mohou být proti šifrám vedeny. Práce se také věnuje možnostem bezpečné identifikace uživatelů. Jsou popsána statická hesla, jednorázová hesla, klientské certifikáty a systémy založené na principu challenge-response. Analyzována je jejich vhodnost a odolnost proti praktikám typu ?Phishing?, ?Pharming?, ?Vishing? nebo útok typu ?Man in the middle?. Zmíněno je i dodatečné zabezpečení prováděných transakcí. ?Bezpečnostní politika jednotlivce? doporučuje pravidla, která by měl dodržovat každý zodpovědný klient. Naznačeny jsou i technologie, které by podstatně zvýšily ochranu před neoprávněným vniknutím do systému a které by také umožnily odhalení podvodných transakcí v reálném čase.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.