National Repository of Grey Literature 24 records found  previous11 - 20next  jump to record: Search took 0.01 seconds. 
Design of methodology for vulnerability assesment
Pecl, David ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design of the own method, which aims to assess vulnerabilities that it is easier to identify those with high priority. The method is based on three groups of parameters. The first group describes the technical assessment of the vulnerability, the second is based on the requirements to ensure the confidentiality, integrity and availability of the asset and the third group of parameters evaluates the implemented security measures. All three groups of parameters are important for prioritization. Parameters describing the vulnerability are divided into permanent and up-to-date, where the most important up-to-date parameter are Threat Intelligence and easy of exploitation. The parameters of the impact on confidentiality, integrity and availability are linked to the priority of the asset, and to the evaluation of security measures, which increase the protection of confidentiality, integrity and availability. The priority of the asset and the quality of the countermeasures are assessed based on questionnaires, which are submitted to the owners of the examined assets as part of the vulnerability assessment. In the third part of the thesis, the method is compared with the currently widely used the Common Vulnerability Scoring System. The strengths of the proposed method are shown in several examples. The effectiveness of prioritization is based primarily on the priority of the asset and the security measures in place. The method was practically tested in a laboratory environment, where vulnerabilities were made on several different assets. These vulnerabilities were assessed using the proposed method, the priority of the asset and the quality of the measures were considered, and everything was included in the priority of vulnerability. This testing confirmed that the method more effectively prioritizes vulnerabilities that are easily exploitable, recently exploited by an attacker, and found on assets with minimal protection and higher priority.
Suggestions on Improvement of the Corporate Culture iof the Company HILTI CZECH REPUBLIC corporation
Cirková, Jana ; Radil, Jan (referee) ; Pokorný, Jiří (advisor)
This Diploma Thesis analyses an important part of the corporate culture in HILTI Czech Republic, particularly working and private life area balance. It contains improvement suggestions in time management sphere, so the employees work more effective and not only stand the test without detriment to family life and leisure time activities in the hard reality of nowadays, but also being successful.
Time Management as one of the managerial competencies
Nováková, Jana ; Vrzáček, Petr (advisor) ; Rabiňáková, Dana (referee)
This diploma thesis deals with the topic of time management as one of the managerial competencies needed to successfully perform managerial work. The diploma thesis shows a theoretical point of this theme, its application in practice and empirici research. The main aim of diploma thesis is to show to managers the possibilities of such self- assessment may be carried out in the field of time management, discover their strengths and weaknesses in this area and find potential opportunities for development. To develop the empirical part of diploma thesis I chose technique of management shadowing, method of 360degree feedback and Competency Based Interview. Into the research I have included three manager women of non-profit and profit organizations. The research resulted serious and less serious individual shortcomings in the theme of in time management. The most serious shortcomings may include reluctance to delegate tasks, which is due to a lack of confidence in the ability of colleagues and subordinates managers, and inability to reject the request due to a sense of guilt against the applicant. The empirical part revealed to the manageress their weakest point in time management and the potential development in this area. Manageress also tried the techniques that can diagnose their current level of...
European Union information policy at the time of the Bangemann's activities in comparison with USA
Mikanová, Helena ; Vlasák, Rudolf (advisor) ; Očko, Petr (referee)
(in English) The thesis "Information Policy of European Union in Bangemann's activities period in comparison with USA" is devoted to the Information policy issue applied by the European Union and the United States of America. The thesis structure is defined at the earliest; afterwards the basic terms are followed. The thesis describes the European Union history, which provides context needed to be able to understand the European Union Information policy. The description and evaluation of the European Information policy in Bangemann's activities period in comparison with USA in the same time period and the possibility of mutual utilization of pros of the Information policy of both countries is the aim of this thesis. The following part is occupied with the comparison of EU and USA Information policy at the beginning of 21st century.
Experimental network for QoS support testing
Fogl, Miroslav ; Mácha, Tomáš (referee) ; Novotný, Vít (advisor)
The work specifies problems with support of qualitative requirements in IP network services on the network and link layer. There are also described options of qualitative support of individual networking components in the UTKO laboratory (routers, L3 switches). Created experimental network is loaded by various types of service (VoIP, FTP, HTTP, Video). Data services realization is ensured by available terminals (IP phones, IP cameras, IP video-phones, servers, client stations). Metering is targeted on the manipulation with packets in the router. Options which Cisco router offers are verified by packet analysis. Available methods of dropping are compared on the base of metering and evaluated. Optimal handling with output queue after metering in experimental network is LLQ mechanism. It is able to prefer packets according to their priority in the IP header. Further the difference of link overloading by huge dataflow after QoS policy using is simulated. To reach availability of data services in the whole network is necessary to deal with mechanisms for qualitative services support in all the network components in the network.
Design of Switch Used in Modern Communication Networks
Mojžiš, Ľubomír ; Novotný, Bohumil (referee) ; Škorpil, Vladislav (advisor)
This diploma thesis deals with switching components of modern communication networks. A switch architecture focused on the quality of service is described in this paper and there are two switch models designed and simulated in the simulating program MATLAB-SIMULINK. The first model is based on classic switching and the other one is controlled by neural network. A laboratory exercise suitable for communication networks education is created in this paper on the basis of designed models.
Switch optimization in converged network
Švec, Adam ; Sobek, Jiří (referee) ; Škorpil, Vladislav (advisor)
Switch Optimization in a Converged Network thesis discusses the role of the Ethernet switch in the network. It describes differences between the switch and the hub in the network and the impacts on the collision domain size. In the converged network, priority data switching according to their origin and thus the qualitative point of view is also addressed - e-mails, voice services and multimedia will each behave differently. A real element, switch L3 - a switch with services quality support - is mentioned. The tool Matlab - Simulink is briefly described and a functional simplified model of the ethernet switch was created. Furthermore, the topic was used as a theme for a laboratory task in the subject Services of Telecommunication Networks. A model for Simulink and an example of the laboratory protocol for the created task are attached to the thesis.
Testing of QoS support in experimental data network
Fogl, Miroslav ; Škorpil, Vladislav (referee) ; Novotný, Vít (advisor)
This work deals with the qualitative requirements on services in IP networks based on technology Ethernet. We describe basic methods for imposing quality control mechanisms on services within networks. We elaborate on the ways, in which packets can be handled, overload controlled and transfer speed in network elements limited. Attention is given also to the Network Layer and Link Layer. Based on concrete specifications of network devices in UTKO laboratory an experimental network was designed and constructed. Network consisting of routers and switches linked several servers with client stations. Various types of data transfers (VoIP, HTTP, FTP, video) were generated. Several techniques for handling packets with different priorities were verified and compared. We observed that, in situations when connections are under full load, implementation of QoS support in the network becomes very important. This observation was confirmed by measurements. We also measured the parameters of the system during simulations of various situations, such as overload of a connection due to unsolicited operations or failure of a connection between routers. In order to guarantee the quality of services it is necessary to create a domain, in which rules are consistently observed in all network elements.
QoS in UMTS
Kavan, Radovan ; Hanus, Stanislav (referee) ; Kejík, Petr (advisor)
This thesis treats of QoS (Quality of Service) in UMTS system. The term quality of service is frequently used, recently, however not only in computer networks, but also more and more in mobile networks also. Present system of 2nd generation (2G) GSM enables only limited exploitation of QoS function. System UMTS is a system of 3rd generation (3G) already and contains quality of service in greater measure which is ensured with number of algorithms and functions. Individual QoS functions enable effective utilization of radio interface, support maintenance of planned coverage and offer high spectral efficiency. Functions that cater to quality of service are called RRM functions (Radio Resource Management). There exist five basic functions in UMTS system that are Admission control (AC), Power control (PC), Load control (LC), Handover control (HC) and Packet scheduler (PS). These functions are responsible for control of network access, control of power, control of network load, control of handover and packet (bit rate) scheduling. Last three functions are usually collectively designated as Congestion control, control of network overload. UMTS layer model, differentiation of services, traffic classes and 3GPP concept are also discussed. In thesis the attention is piad to Admission control algorithm – control of network access – in the uplink direction and to different ways of load (in the cell) modeling. Individual approaches are simulated in MATLAB. A possibility of using algorithm in the real system is discussed in conclusion.
Quality of services support in the end applications
Zelinka, Jiří ; Novotný, Vít (referee) ; Hošek, Jiří (advisor)
The topic of this diploma thesis has been chosen for a discussion and implementation of quality of service on the application and link layer of the OSI model. At the beginning of this thesis the general parameters and basic technologies of the OSI model network layer has been explained. This part was chosen as a resource for explanation of the basic parameters in the quality of services. Basic part is followed by the introduction to the Ethernet technology, which became as a ground for the real model in this diploma thesis. As a part of this section has been written a block which contains a analysis of quality of services in the Ethernet, which means the implementation of IEEE 802.1Q/p. This analysis is followed by structured descrition of the controlling and functionality of quality of services parameters on the link layer with the system tool in the Windows XP, description of Win XP link layer drivers and its modification with system tool tcmon. The end of the theoretical part is represented by introduction to the implementation of quality of service in the wireless networks especially the 802.11e standard. At the beginning of the practical part is specified the description of the topology design which is dedicated to the quality of services implementation. This section is developed to well-founded analysis of applications which were used during topology creating. The last segment of this thesis is dedicated to evolving the practical informations which were obtained during the measurement.

National Repository of Grey Literature : 24 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.