National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Acquisition of email communication security service according to ISMS
Foltýn, Adam ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The diploma thesis focuses on a proposal of acquisition of email communication security service according to ISMS for a company which provides trading services on financial markets. The thesis is divided into three parts. In the theoretical part, necessary terms and theoretical essentials are explained in order to ensure understanding of the following parts of the thesis. The following analytical part describes the company's current security status of information. As a solution in the final part of the thesis, partial risk analyses are conducted. Based on these, suitable options for email communication security measures are proposed as well as their the economical evaluation.
Acquisition of email communication security service according to ISMS
Foltýn, Adam ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The diploma thesis focuses on a proposal of acquisition of email communication security service according to ISMS for a company which provides trading services on financial markets. The thesis is divided into three parts. In the theoretical part, necessary terms and theoretical essentials are explained in order to ensure understanding of the following parts of the thesis. The following analytical part describes the company's current security status of information. As a solution in the final part of the thesis, partial risk analyses are conducted. Based on these, suitable options for email communication security measures are proposed as well as their the economical evaluation.
Design and implementation of security policies in the enterprise
Turecký, Zdeněk ; Bruckner, Tomáš (advisor) ; Vojtíšek, Vladimír (referee)
This bachelor thesis deals with unnecessary user rights in an enterprise. It judges their necessity and subsequent restrictions. At the beginning of the thesis are described two basic types of threats and business tools that help to prevent them. Further is introduced the specific company, where the analysis of current state of user rights is made. On its basis are created group policies, which are then implemented across enterprise infrastructure. Afterwards all problems, that appeared during the implementation or after that are commented and solved. Finally the new state is compared to the original one and some options how to expand this thesis are listed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.