National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
The Design of the Maturity Model for Measuring Effectivity of the SIEM System in the Organisation
Kosková, Zdeňka ; Lukáš,, KUBÍK (referee) ; Ondrák, Viktor (advisor)
The bachelor‘s thesis addresses the issue of evaluating the effectiveness of the SIEM system in an industrial environment. The goal was to propose a methodology that uses a MITRE ATT&CK matrix for ICS for evaluation. The thesis first analyses existing solutions and their potential applications, followed by a description of monitoring evaluation in an energy company, which together with the matrix form the basis of the proposed solution. The main output of the thesis is a proposal for quantitative evaluation of individual techniques of the matrix, such as graphical interpretation and the possibility to share results securely with other CERT teams.
Analyzing the S7 protocol and creating a virtualized industrial scenario
Srovnal, Dominik ; Kuchař, Karel (referee) ; Pospíšil, Ondřej (advisor)
Industrial network is frequent target of attacks used to damage production and disrupt today infrasctructure. It is necessary to capture such attacks and be able to react correctly to them. That is the reason, why it is necessary to deal with the problematics from the very beginning to the final element. Meaning of this is a prevention of possible attacks and the prerequisite for preventing such attacks on network communication. In order to detect potential weaknesses, communication analyzes and simulations need to be performed. This can be achieved using sofware designed specificly for such situations. Thus two programs were created to simulate the industrial scenario and analyze the S7 protocol. The data received from this communication were analyzed and subsequently scrutinized.
A Proposal for Industrial ISMS Implementation in Manufacturing Company
Kulhánek, Radek ; Milan,, Šobr (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with industrial ISMS implementation in manufacturing company. The theoretical part of thesis summarizes the theoretical knowledge in the field of information security and industrial security. In the following section company AB Komponenty s.r.o. is analysed. Then is performed analysis of risks based on selected assets and potential threats. Followed by design of the countermeasure to minimalize potential threats.
Industrial control system security design
Strnad, Matěj ; Martin,, Keprt (referee) ; Sedlák, Petr (advisor)
The subject of the master's thesis is a design of security measures for securing of an industrial control system. It includes an analysis of characteristics of communication environment and specifics of industrial communication systems, a comparison of available technological means and a design of a solution according to investor's requirements.
Methodology of pentesting in industrial control systems
Slabý, Patrik ; Lukáš,, Petr (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the design of a methodology for penetration testing of industrial control systems. This work aims to approach the issue of these systems, which has completely different priorities than information technology systems, and based on these parameters to then design a procedure and rules that should be followed by the subjects participating in the tests. The absence of a methodology for such a specific environment affecting cyberspace and physical space can have catastrophic consequences. The theoretical part deals with basic concepts and terminology important for information and cyber security, operational technologies, and penetration tests. The design then contains a description of the individual steps of the penetration testing methodology for industrial control systems.
Machine Learning-based Anomaly Detection in Industrial Control Systems
Tsymbal, Kateryna ; Holasová, Eva (referee) ; Pospíšil, Ondřej (advisor)
The main goal of this thesis is to design a system for anomaly and intrusion detection in industrial control systems using machine learning. The theoretical part of the thesis provides a basic theoretical overview of industrial control systems and their security. Furthermore, knowledge about anomaly detection techniques and potential challenges in this area are discussed. Lastly, the theoretical part has reviewed various solutions for anomaly detection in industrial control systems using machine learning. In the practical part, machine learning algorithms are applied to the selected HAI dataset. Finally, the findings on the suitability of the used algorithms and the possibilities for further research are summarized. The purpose of this thesis is to improve the security of industrial control systems, and the results can serve as a basis for the future development of more effective methods for anomaly detection in this area.
Methodology of pentesting in industrial control systems
Slabý, Patrik ; Lukáš,, Petr (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the design of a methodology for penetration testing of industrial control systems. This work aims to approach the issue of these systems, which has completely different priorities than information technology systems, and based on these parameters to then design a procedure and rules that should be followed by the subjects participating in the tests. The absence of a methodology for such a specific environment affecting cyberspace and physical space can have catastrophic consequences. The theoretical part deals with basic concepts and terminology important for information and cyber security, operational technologies, and penetration tests. The design then contains a description of the individual steps of the penetration testing methodology for industrial control systems.
Analyzing the S7 protocol and creating a virtualized industrial scenario
Srovnal, Dominik ; Kuchař, Karel (referee) ; Pospíšil, Ondřej (advisor)
Industrial network is frequent target of attacks used to damage production and disrupt today infrasctructure. It is necessary to capture such attacks and be able to react correctly to them. That is the reason, why it is necessary to deal with the problematics from the very beginning to the final element. Meaning of this is a prevention of possible attacks and the prerequisite for preventing such attacks on network communication. In order to detect potential weaknesses, communication analyzes and simulations need to be performed. This can be achieved using sofware designed specificly for such situations. Thus two programs were created to simulate the industrial scenario and analyze the S7 protocol. The data received from this communication were analyzed and subsequently scrutinized.
The Design of the Maturity Model for Measuring Effectivity of the SIEM System in the Organisation
Kosková, Zdeňka ; Lukáš,, KUBÍK (referee) ; Ondrák, Viktor (advisor)
The bachelor‘s thesis addresses the issue of evaluating the effectiveness of the SIEM system in an industrial environment. The goal was to propose a methodology that uses a MITRE ATT&CK matrix for ICS for evaluation. The thesis first analyses existing solutions and their potential applications, followed by a description of monitoring evaluation in an energy company, which together with the matrix form the basis of the proposed solution. The main output of the thesis is a proposal for quantitative evaluation of individual techniques of the matrix, such as graphical interpretation and the possibility to share results securely with other CERT teams.
Industrial control system security design
Strnad, Matěj ; Martin,, Keprt (referee) ; Sedlák, Petr (advisor)
The subject of the master's thesis is a design of security measures for securing of an industrial control system. It includes an analysis of characteristics of communication environment and specifics of industrial communication systems, a comparison of available technological means and a design of a solution according to investor's requirements.

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.