National Repository of Grey Literature 129 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
The (New) Security Dilemma: Impact of technological innovation on the security dilemma
Kadre, Sudhanshu ; Špelda, Petr (advisor) ; Šenk, Michal (referee)
The enduring concept of the security dilemma seen from the lens of the technological revolution in Information Security provides a different perception than the traditional version of the dilemma. Moving from apparent to perceived threats, the underlying fear and uncertainty between state actors in an anarchic system have witnessed an increase. This thesis has the objective to study the effect of the advancements in Information and Community Technology, particularly in Cybersecurity, on the perception of the security dilemma. By analysing the basis of Information Security theory while simultaneously probing the cyber threat landscape through the use of case studies of cyber attacks and cyber diplomacy, the thesis highlights the relevance of the security dilemma in cyberspace
Long-term Perimeter Protection System Monitoring Using State of a Polarization Analyzer
Tomasov, Adrian ; Dejdar, Petr ; Záviška, Pavel ; Spurny, Vladimir ; Munster, Petr ; Horvath, Tomas ; Klicnik, Ondrej
The paper proposes the deployment of a perimeterand data protection system with long-term data storage in anInfluxDB time-series database enhanced by a graphical interfacebased on a Grafana dashboard. The perimeter is protected usinga fiber optic cable, and the transmitted light is analyzed by a stateof polarization analyzer detecting mechanical vibrations. Usinga simple spectrum comparison method and a threshold, it candetect a perimeter breach and generate an alert.
Implementation of the minimum security standard in company
Křiva, Adam ; Květoslav,, Hošek (referee) ; Sedlák, Petr (advisor)
The subject of the diploma thesis is the implementation of a minimal security standard within a company. The thesis focuses on theoretical foundations in the first part. Subsequently is conducted an analysis of the current state within the company. The actual solution proposal determines the scope of the minimal security standard, identifies and evaluates assets, describes the created security policies from the managerial and technical aspects. The developed security policies are then economically assessed.
The Impacts of a Ransomware Attack: Risk Management and Implementation of the Minimal Security Standard
Syrovátková, Lucie ; Alena,, Rybáková (referee) ; Sedlák, Petr (advisor)
The aim of the thesis is to implement cyber security in a small company as a result of a suffered ransomware attack based on the requirements of the Minimal Security Standard, which is a support material for entities that are not regulated by the Cyber Security Act in the Czech Republic. The main goal is achieved through the three main parts into which the thesis is divided. The introductory part is a theoretical support for the remainder of the thesis and contains the main concepts and areas that are used in the thesis. The analytical part focuses on the description of a possible vector of a ransomware attack and its consequences. In the second part of the analytical chapter, the current situation of the company is assessed in comparison to the requirements of the Minimal Security Standard. The last part proposes specific security measures, creation of security policies adapted to the company's capabilities and an economic evaluation.
Mapping Cyber Security Measures: From Legislation to Technical Implementation
Hopp, Jiří ; MSc, Mezera Michal, (referee) ; Sedlák, Petr (advisor)
In my thesis, I focused on creating a systematic tool for mapping technical measures and mitigations to national legislative cybersecurity requirements. I conducted an analysis of the addressed issue, which revealed opportunities for developing the tool and revealed forthcoming changes in legislative requirements based on the EU directive NIS2. In the following part of the thesis, I described the design and development of the mentioned tool in the form of a table. The tool met the client's requirements and mapped relevant technical measures to individual points of the current and NIS2-derived legislative requirements. Based on consultations with the client, I determined that the objectives outlined in the thesis were successfully met and that the developed tool will be utilized in a real-world environment.
Web Browser Extension Providing Protection of Company Data
Dvořák, Jan ; Bednář, Martin (referee) ; Polčák, Libor (advisor)
This thesis focuses on securing company data stored in SaaS storage. In contrast to data stored on-premise, data stored in the cloud face several additional risks, be it from the outside as well as from the inside of the organization. The main risk, whose impacts we try to mitigate in this work, is an accidental data leak by one of the organization's employees. An extension for the Google Chrome web browser was designed and implemented as a solution to this issue. Implementation complications rising from transitioning to a new version of the manifest are also examined in part of this work. The thesis is concluded with the execution of experiments simulating practical data loss scenarios and a verdict on whether a web extension is an appropriate means for creating a tool providing data loss prevention capabilities.
Methodology of law firm security
Veselý, Marek ; Mikuláš,, Vargic (referee) ; Sedlák, Petr (advisor)
The topic of the master‘s thesis is the creation of methodology and subsequent security of equipment including data protection for a law firm. The thesis contains theoretical background, analysis of the current state of the company, on which the proposed solution is based. The proposed solution includes risk analysis and proposal of appropriate security measures including implementational recommendations for the elimination or minimization of identified risks.
Assessment of the level of cyber risks using the proposed tool
Černoušek, Robin ; Veselý Jindřich, Ing. MBA (referee) ; Sedlák, Petr (advisor)
The thesis deals with the issue of information security management system and determination of the current level of cybersecurity maturity and determination of risk areas. The theoretical part contains the basic background and concepts of the whole thesis. The chapter of the current state analysis introduces the organization and describes the current state of its information security management system and risk management. The actual design of the solution is a tool created in MS Excel that allows the organization to determine the current level of risk.
Organizational measures to ensure information security at Faculty of business and management
Mráz, Tomáš ; Petr,, Barták (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the analysis of the current state and the design of security measures within the information security management system at the Faculty of Business, Brno University of Technology. The proposed security measures take into account in particular the requirements set by Act No. 181/2014 Coll. on Cyber Security and on Amendments to Related Acts and Decree No. 82/2018 Coll. on security measures, cyber security incidents, reactive measures, filing requirements in the field of cyber security and data disposal.
Information System Assessment and Proposal of ICT Modification
Novotný, Štěpán ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
The diploma thesis deals with the assessment of the current state of the information system of a selected social enterprise operating in the field of administration outsourcing. Based on the findings of the analyses and primary empirical research, the state of efficiency and especially security of the enterprise information system is evaluated. The result of this work is the development of a plan for the implementation of the new system and the proposal of changes and measures leading to the elimination of identified deficiencies and mitigation of potential risks.

National Repository of Grey Literature : 129 records found   1 - 10nextend  jump to record: