National Repository of Grey Literature 16 records found  previous11 - 16  jump to record: Search took 0.01 seconds. 
Collecting Indicators of Compromise from Operating Systems
Procházka, Jiří ; Ryšavý, Ondřej (referee) ; Grégr, Matěj (advisor)
Focus of this thesis is on the design and implementation of an application for gathering indicators of compromise from the systems. In the thesis, there is an introduction to the term indicator of compromise and description of commonly used categories. Next, there is a summary of existing tools with a similar focus. In the thesis, there is a list of some existing formats for sharing of indicators of compromise and selection of format which resulting application uses. After the implementation, application was tested both locally and on infrastructure of cyber exercise.
Security of Work with Electronic Data in Industrial Enterprises
Žáčková, Eliška ; Šisler, Vít (advisor) ; Souček, Martin (referee)
The aim of this thesis is not only to characterise the key terms related to this field, but also to analyse the possible solutions to the area in a particular industrial enterprise in the Czech Republic by means of a case study which is a reliable method of qualitative research. The thesis is divided into theoretical and practical part. In the theoretical part the terms such as information, electronic data, know-how, enterprise information systems, cybercrime, and cyberterrorism are defined. The practical part drawing on the theoretical part gives a thorough analysis of the initial state of an industrial enterprise in food industry. Furthermore, it deals with the implementation of the ECM (Enterprise Content Management) which is considered a possible solution to the security of work with electronic data in industrial enterprise.
Increase Security Awareness at the Secondary and Higher Vocational Schools
Kornelly, Aleš ; Rybáková, Alena (referee) ; Sedlák, Petr (advisor)
This thesis describes the design and implementation of ISMS to a particular high school. The aim is to provide our own recommendations and suggestions to improve the current situation. Introductory section explains the various basic concepts related to ICT security, the next section describes the facilities of the school and the current state of the school. In the practical part are individually discussed the proposed security measures.
The Implementation of Information Security Management System in Small Company
Čampula, Roman ; Herout,, Pavel (referee) ; Sedlák, Petr (advisor)
This master’s (diploma) thesis analyzes security situation of the software company. It contains theoretical information which is necessary for the installation of the information security system. It also demonstrates the method of its application. On the basis of the security risks analysis it suggests arrangements which are currently necessary for the required information security in the company. The whole thesis is covered on the basis of the ČSN ISO/IEC 27001:2006 norm.
Information Security Management in Healthcare Organization
Mikulová, Aneta ; Janečková, Eva (referee) ; Sedlák, Petr (advisor)
The topic of my thesis is "Information security management in healthcare organization." Medical facilities are generally the ones who should put emphasis on information security. For my thesis I chose aesthetic private clinic called Visage, I underwent safety analysis. The analysis showed that only a small part of the security process is documented in the clinic. This is particularly deficient in terms of business. There may be a leak of sensitive information on the health status of individual patients. It is necessary to better treat the handling of these data. The aim of this thesis is a security manual that will describe the personal, physical and IT security.
Virtual cooperation in medicine
Gabriel, Jiří ; Šedivá, Zuzana (advisor) ; Buchalcevová, Alena (referee)
This bachelor work deals with methods and means of the virtual cooperation in medicine. It covers areas of theory and organization of team management, as well as the field of technology -- software and hardware, including practical examples and assets of these instruments for virtual cooperation. There is a special emphasis on the field of IT security in this work (author's professional IT specialization). The special part covers the main goal of this work: To refer to a real application of virtual technology in the medical environment, from both software and hardware area. It shows common aspects and differences, set by the specific area of medicine and medical profession. To reach this goal, there have been used different resources, like classic books, e-books, online sources on the Internet (with actual news), as well as author's own skills from medicine and online medical consulting, including its possibilities and funding.

National Repository of Grey Literature : 16 records found   previous11 - 16  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.