National Repository of Grey Literature 224 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Introducing compliance with the TISAX standard into the company
Tesařová, Tereza ; Marek, Chlup (referee) ; Sedlák, Petr (advisor)
Diplomová práce se věnuje implementaci shody se standardem TISAX ve společnosti působící v automobilovém průmyslu. Její první část uvádí teoretický podklad pro danou problematiku, druhá potom analyzuje současný stav. Následuje návrhová část, kde je zahrnuta samotná implementace i finanční zhodnocení pomocí ROSI modelu.
Information security management of small business
Nguyen, Hoai Nam ; Tran,, Manh Hung (referee) ; Ondrák, Viktor (advisor)
The aim of this bachelor's thesis is to analyse the company's ISMS and to propose certain measures based on the found shortcomings. The introductory part of the thesis focuses on a summary of the theoretical foundations in the field of information security, with the key element being the set of standards ISO/IEC 27000. The analytical part describes the current state of ISMS in a specific company. In the practical part, appropriate measures are selected according to the result of the analysis.
Deployment of a DLP solution in an energy company
Přikryl, Adam ; Veselý Jindřich, Ing., MBA (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with the assessment of the deployment of DLP solutions in an energy company with the consideration of transition to another supplier. The first part summarizes the theoretical background needed to understand the issues of data protection and DLP systems. The second part provides an analysis of the current state of the company. The third part presents a proposed solution, which is based on the theoretical background and analysis of the current state, includes a description of the systems, a proposal for switching to another supplier and an economic evaluation.
Economic impact of the implementation of a software tool for compliance with VKB in the corporate environment
Nováková, Natálie ; Svoboda Vlastimil, Ing., MBA (referee) ; Sedlák, Petr (advisor)
This thesis focuses on evaluating the economic impact of implementing a software tool for compliance with the Cybersecurity Decree (VKB) in a corporate environment. As part of the thesis, an analysis of available cybersecurity management tools was conducted, including a comparison of their features and functionalities. Based on the results of this comparison, a specific tool was selected that appears to be the most suitable. The output of this thesis is an economic comparison of the costs associated with each solution option.
Web Application for Evaluation of Security Testing Tools
Moravec, Vojtěch ; Lieskovan, Tomáš (referee) ; Ilgner, Petr (advisor)
The bachelor thesis focuses on the design, development, and implementation of an intentionally vulnerable environment in the form of a web application. The resulting web application encompasses vulnerabilities across categories outlined in the OWASP Top 10 project, specifically following its 2021 version. Through this application, it is possible to assess and compare automated tools for penetration testing, as well as tools for static code security analysis. The thesis is divided into five chapters. In the introduction, the OWASP Foundation, which oversees the OWASP project, is described. The analysis of selected intentionally vulnerable web applications is then presented. Subsequent chapters delve into the design of the custom intentionally vulnerable web application, detailing the technologies used in its development and outlining all vulnerabilities present in the application. In the conclusion of the thesis, testing of the resulting vulnerable application is conducted using the aforementioned tools, and a summary of the achieved results is provided. Apart from the aforementioned testing and comparison of automated tools in the fields of penetration testing and static analysis, the application can also be utilized for educational purposes. This is primarily facilitated by the attached fixes and explanations, which accompany each vulnerability within the application.
Information System Assessment and Proposal of ICT Modification
Linner, Marek ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
The thesis focuses on assessing the information system of a selected company and proposes ways to improve its capabilities. The introductory theoretical part of the thesis presents issues related to information systems, user interfaces, and information security. In the following chapter, analyses of the current state of the information system are elaborated. The third chapter identifies issues and suggests solutions. The final chapter evaluates the proposals from an economic perspective.
Preparing the company for the introduction of compliance for NIS2
Spišáková, Lenka ; Peter,, Smorada (referee) ; Sedlák, Petr (advisor)
The thesis addresses the issue of the newly emerging European NIS2 directive, which aims to increase cyber security in an organisation. The intention of the thesis is to implement compliance with the NIS2 directive into society. In the introductory chapter, the objectives of the thesis will be presented, followed by a description of the theoretical background and then an analysis of the current state of the project. The final chapter is devoted to the proposed solution of creating a risk analysis and the subsequent implementation of the proposal in the company.
Security testing of IPv6 family protocols and related vulnerabilities
Vopálka, Matěj ; Phan, Viet Anh (referee) ; Jeřábek, Jan (advisor)
This thesis discusses the Internet Protocol version 6 (IPv6), especially the secure deployment of the protocol. The thesis deals with the shortcomings of IPv4 protocol and reason of development of IPv6 protocol. It covers topics like IPv6 addressing, structure of frames, the initial types of IPv6 extension headers. Additionally, the thesis explores related protocols to IPv6, such as NDP, SLAAC, adn DHCPv6. The thesis provides an introduction to penetration testing, describes the basic types of hackers and gives a general overview of information security attacks. The practical part is devoted to the development of an application for automatic vulnerability testing of IPv6 networks Penvuhu6. The tool is developed in Python programming language using Scapy library. Penvuhu6 has been tested in an emulated network environment with the GNS3 program. Three test scenarios were developed for the tool focusing on testing the passage of repetitive and misaligned headers, overlapping fragments, and Router advertisement and DHCPv6 advertisement messages. Penvuhu6 was tested on an emulated RouterOS device with basic and restrictive configurations.
The Impacts of a Ransomware Attack: Risk Management and Implementation of the Minimal Security Standard
Syrovátková, Lucie ; Alena,, Rybáková (referee) ; Sedlák, Petr (advisor)
The aim of the thesis is to implement cyber security in a small company as a result of a suffered ransomware attack based on the requirements of the Minimal Security Standard, which is a support material for entities that are not regulated by the Cyber Security Act in the Czech Republic. The main goal is achieved through the three main parts into which the thesis is divided. The introductory part is a theoretical support for the remainder of the thesis and contains the main concepts and areas that are used in the thesis. The analytical part focuses on the description of a possible vector of a ransomware attack and its consequences. In the second part of the analytical chapter, the current situation of the company is assessed in comparison to the requirements of the Minimal Security Standard. The last part proposes specific security measures, creation of security policies adapted to the company's capabilities and an economic evaluation.
Mapping Cyber Security Measures: From Legislation to Technical Implementation
Hopp, Jiří ; MSc, Mezera Michal, (referee) ; Sedlák, Petr (advisor)
In my thesis, I focused on creating a systematic tool for mapping technical measures and mitigations to national legislative cybersecurity requirements. I conducted an analysis of the addressed issue, which revealed opportunities for developing the tool and revealed forthcoming changes in legislative requirements based on the EU directive NIS2. In the following part of the thesis, I described the design and development of the mentioned tool in the form of a table. The tool met the client's requirements and mapped relevant technical measures to individual points of the current and NIS2-derived legislative requirements. Based on consultations with the client, I determined that the objectives outlined in the thesis were successfully met and that the developed tool will be utilized in a real-world environment.

National Repository of Grey Literature : 224 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.