National Repository of Grey Literature 90 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
The (New) Security Dilemma: Impact of technological innovation on the security dilemma
Kadre, Sudhanshu ; Špelda, Petr (advisor) ; Šenk, Michal (referee)
The enduring concept of the security dilemma seen from the lens of the technological revolution in Information Security provides a different perception than the traditional version of the dilemma. Moving from apparent to perceived threats, the underlying fear and uncertainty between state actors in an anarchic system have witnessed an increase. This thesis has the objective to study the effect of the advancements in Information and Community Technology, particularly in Cybersecurity, on the perception of the security dilemma. By analysing the basis of Information Security theory while simultaneously probing the cyber threat landscape through the use of case studies of cyber attacks and cyber diplomacy, the thesis highlights the relevance of the security dilemma in cyberspace
Implementation of the minimum security standard in company
Křiva, Adam ; Květoslav,, Hošek (referee) ; Sedlák, Petr (advisor)
The subject of the diploma thesis is the implementation of a minimal security standard within a company. The thesis focuses on theoretical foundations in the first part. Subsequently is conducted an analysis of the current state within the company. The actual solution proposal determines the scope of the minimal security standard, identifies and evaluates assets, describes the created security policies from the managerial and technical aspects. The developed security policies are then economically assessed.
The Impacts of a Ransomware Attack: Risk Management and Implementation of the Minimal Security Standard
Syrovátková, Lucie ; Alena,, Rybáková (referee) ; Sedlák, Petr (advisor)
The aim of the thesis is to implement cyber security in a small company as a result of a suffered ransomware attack based on the requirements of the Minimal Security Standard, which is a support material for entities that are not regulated by the Cyber Security Act in the Czech Republic. The main goal is achieved through the three main parts into which the thesis is divided. The introductory part is a theoretical support for the remainder of the thesis and contains the main concepts and areas that are used in the thesis. The analytical part focuses on the description of a possible vector of a ransomware attack and its consequences. In the second part of the analytical chapter, the current situation of the company is assessed in comparison to the requirements of the Minimal Security Standard. The last part proposes specific security measures, creation of security policies adapted to the company's capabilities and an economic evaluation.
The design of the cybersecurity training methodology for middle and top management
Kosková, Zdeňka ; Lukáš,, Kubík (referee) ; Sedlák, Petr (advisor)
The diploma thesis addresses the issue of developing the methodology for cybersecurity training of middle and top management. The goal is to propose a methodology for the needs of energy company, wich will be focused on education of the target group of employees that represents a high-risk. The introductory part is focused on theroretical basis such as basic terminology, current legislation and security awareness education. The analysis is focused on the current state of the cyber and infromation security education program in the energy company. The actual solution contains the proposal of the methodology itself and its specific solution with regard to the current state and needs of the organization.
Mapping Cyber Security Measures: From Legislation to Technical Implementation
Hopp, Jiří ; MSc, Mezera Michal, (referee) ; Sedlák, Petr (advisor)
In my thesis, I focused on creating a systematic tool for mapping technical measures and mitigations to national legislative cybersecurity requirements. I conducted an analysis of the addressed issue, which revealed opportunities for developing the tool and revealed forthcoming changes in legislative requirements based on the EU directive NIS2. In the following part of the thesis, I described the design and development of the mentioned tool in the form of a table. The tool met the client's requirements and mapped relevant technical measures to individual points of the current and NIS2-derived legislative requirements. Based on consultations with the client, I determined that the objectives outlined in the thesis were successfully met and that the developed tool will be utilized in a real-world environment.
Methodology of law firm security
Veselý, Marek ; Mikuláš,, Vargic (referee) ; Sedlák, Petr (advisor)
The topic of the master‘s thesis is the creation of methodology and subsequent security of equipment including data protection for a law firm. The thesis contains theoretical background, analysis of the current state of the company, on which the proposed solution is based. The proposed solution includes risk analysis and proposal of appropriate security measures including implementational recommendations for the elimination or minimization of identified risks.
Organizational measures to ensure information security at Faculty of business and management
Mráz, Tomáš ; Petr,, Barták (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the analysis of the current state and the design of security measures within the information security management system at the Faculty of Business, Brno University of Technology. The proposed security measures take into account in particular the requirements set by Act No. 181/2014 Coll. on Cyber Security and on Amendments to Related Acts and Decree No. 82/2018 Coll. on security measures, cyber security incidents, reactive measures, filing requirements in the field of cyber security and data disposal.
Information System Assessment and Proposal of ICT Modification
Novotný, Štěpán ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
The diploma thesis deals with the assessment of the current state of the information system of a selected social enterprise operating in the field of administration outsourcing. Based on the findings of the analyses and primary empirical research, the state of efficiency and especially security of the enterprise information system is evaluated. The result of this work is the development of a plan for the implementation of the new system and the proposal of changes and measures leading to the elimination of identified deficiencies and mitigation of potential risks.
Vulnerability Reports Analysis and Management
Domány, Dušan ; Toropila, Daniel (advisor) ; Galgonek, Jakub (referee)
Various vulnerabilities in software products can often represent a significant security threat if they are discovered by malicious attackers. It is therefore important to identify these vulnerabilities and report their presence to responsible persons before they are exploited by malicious subjects. The number of security reports about discovered vulnerabilities in various software products has grown rapidly over the last decade. It is becoming more and more difficult to process all of the incoming reports manually. This work discusses various methods that can be used to automate several important processes in collecting and sorting the reports. The reports are analyzed in various ways, including techniques of text mining, and the results of the analysis are applied in form of practical implementation.
Corporate Network Monitoring Concept
Hopp, Jiří ; Aleš,, ŠPIDLA (referee) ; Ondrák, Viktor (advisor)
The bachelor’s thesis analyzes the state of cybersecurity events monitoring in the institution and the security policies of the institution. Based on the analysis suggests updates of the settings of cybersecurity monitoring systems, changes of the security policies, and other steps to increase the state of information security and information systems security in the institution.

National Repository of Grey Literature : 90 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.