National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Design of information security management in accounting outsourcing environment
Hlaváček, Matěj ; Hamouz Zdeněk, Ing. MBA (referee) ; Sedlák, Petr (advisor)
This paper analyses and proposes improvements to information security management at company XYZ. To this end, it uses various tools, frameworks, and analyses to assess the current state of security management. These tools include BPMN notation for processes, Esko software for asset and risk management, PESTLE analysis, Porter's analysis, 7S framework, and IFE and EFE matrices. The paper examines, describes, and evaluates the current state of security management and then proposes processes and procedures for information management, vendor management, human resource management, change management, business continuity, security audits, physical security, access control, mobile device management and other aspects. The paper concludes by presenting the valuable benefits and costs associated with implementing effective security management in a small company.
Bezpečnostní audit síťové infrastruktury podniku
Janza, Čeněk
Bc. Čeněk Janza, Security audit of network infrastructure for company. Brno: Men-del University, 2016. This thesis deals with security audit and its methods for finding gaps in safety and subsequently draft measures to eliminate or minimalize this gaps. This work also describes the standards and legislation to information security. There is car-ried out a safety audit of the business and the analysis results together with the subsequent design of security measures. Further it describes the important issues and points during audit process.
Options to ensure information security by defining a standard behavior of employees
Dvořák, Martin ; Říhová, Zora (advisor) ; Čapek, Jan (referee) ; Novák, Luděk (referee) ; Němec, Petr (referee)
Continually the number of transactions carried out electronically via the internet has grown, as well as the number of users of IT (information technology). In the same way are accruing transactions that may be at risk in terms of information security as well as an increasing number of security incidents threatening financial gain or thefts of sensitive information. Attackers carried out attacks in order to make financial gains using more sophisticated methods, sophisticated not only using information technology but also using social engineering techniques. This growing trend is known about by governments and measures are being taken to help increase the information security of the state. This is evidenced by the fact that the European Parliament recently approved the following Directive Directive of the European parliament and of the council concerning measures to ensure a high common level of network and information security across the Union and the ensuing law on cyber security (Act No. 181/2014 Coll.) adopted by the Parliament of the Czech Republic in the summer of 2014. This act orders organizations which are maintaining critical infrastructure to implement a system to evaluate cybersecurity events (user behavior). So far no unified approach to implement such systems has been defined. Author defines standardized methodology for implementation of systems which evaluate user behavior with focus on optimization of data which these systems have to process to ensure their efficient functionality.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.