• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 47
  • 25
  • 9
  • 6
  • 3
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 193
  • 193
  • 131
  • 61
  • 52
  • 47
  • 46
  • 41
  • 39
  • 38
  • 36
  • 35
  • 33
  • 33
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Uplatnění managementu bezpečnosti informací ve veřejné správě / Application of Information Security Management in Public Administration

Trtílek, Ivo January 2013 (has links)
The diploma thesis deals with an application of information security management system in the organization of public administration and local government. It defines important terms and describes the best practices which are compliant with the ISO/IEC 27000. It contains draft of security manual that can be used as an organization tool for human resources security, IT and physical and environmental security of the organization.
162

Zavedení managementu bezpečnosti informací v podniku dle ISO 27001 / Implementation of Information Security Management in Company According to ISO 27001

Šumbera, Adam January 2013 (has links)
This diploma thesis deals with implementation of the information security management system in company. The theoretical part of thesis summarizes the theoretical knowledge in the field of information security and describes a set of standards ISO/IEC 27000. In the following section the specific company is analysed, and to this company there are then applied theoretical knowledge during the implementation of information security management system.
163

Zavedení ISMS v obchodní společnosti / Implementation of ISMS in the Commercial Company

Dejmek, Martin January 2013 (has links)
This master thesis deals with the implementation of information security management system in the company. It summarizes the theoretical background in this field and uses it to analyze the current state of information security, as well as analysis and risk management and not least the actual implementation of ISMS in the particular company. This work also contains three groups of measures that reduce the impact of identified risks and which also implements an essential parts of ISMS.
164

Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu / The Implementation of ISMS in Small Company Focused on ICT

Kosek, Jindřich January 2014 (has links)
The diploma thesis is focused on the design implementation of information security management system in a small business and is applying theoretical knowledge to real-life situations in a manufacturing company. First of all is performed analysis of current status and the consequent threats which can affect the company's assets. Thereafter are proposed measures based on identified risks and requirements of the owner.
165

Zavedení ISMS v podniku / ISMS Implementation in the Enterprise

Pawlik, Jan January 2015 (has links)
This master thesis deals with the implementation of the information security management system according to the standard ISO/IEC 27 001 in the environment of a small company. In the first part, it focuses on the theoretical background of the information security. The second part deals with the analysis of the company and concept of a company's measures to increase the security of information within the selected company.
166

Návrh na zavedení nutných oblastí ISMS na základní škole / The Proposal for Implementation of Essential ISMS Sections at the Primary School

Kryštof, Tomáš January 2016 (has links)
This master thesis is concerned with the information security on a specific primary school. In the first and second part of this thesis there is an endeavor to provide basic theoretical starting points about ISMS issues, and to get an overview about the current state of the information security at the primary school. This is followed by the practical part where there is the proposal of suitable security steps and recommendation for solution of the most important tasks from the ICT management security perspective.
167

Implementace nových koncových uzlů do firmy a jejich management / Implementation of New Terminal Nodes to the Company and it’s Management

Lukeš, Pavel January 2016 (has links)
This thesis deals with analysis of company’s MBG, spol. s r.o. problems, following with teoretical basis for these problems and in the end, it suggests the solutions. These problems are insufficient monitoring, any of used technology are old and absent of any information security management system. The first part is focused on a teoretical basis for the described problems, the second part will completely analyze all mentioned problems of a company. Final part will contain a solution for every company’s problem, based on theory and analysis with taking care about company’s demand too.
168

Modelo de un Programa Anual de Seguridad y Salud Ocupacional basado en la metodología PHVA para actividades de construcción de PAD de lixiviación en minería superficial / Model of an Annual Occupational Health and Safety Program based on the PDCA methodology for leach PAD construction activities in surface mining

Domínguez Marín, Natalie Susana, Rodríguez Vásquez, Alexandra Jordana 02 January 2021 (has links)
Durante los últimos años, en el marco de la actividad minera superficial en Perú, se ha presentado un elevado número de accidentes debido a la aplicación débil de los Sistemas de Gestión en Seguridad y Salud Ocupacional. Este problema impacta en la salud y bienestar del colaborador y por el lado de la empresa minera, genera pérdidas económicas y un impacto social negativo. En este contexto, el presente trabajo de investigación busca proponer un modelo del Programa Anual de Seguridad y Salud Ocupacional (PASS) para las actividades de construcción de un PAD de lixiviación según la metodología PHVA y basado en el D.S. Nº024 – 2016 – EM. Este modelo establecerá lineamientos, procedimientos y requisitos mínimos para que la organización pueda prevenir, controlar y reducir los accidentes asociados a su personal en el proyecto. Asimismo, se busca que este PASS pueda servir de modelo a otras compañías mineras; el cual establecerá un patrón tanto para minas superficiales que se encuentran en proyecto; como para aquellas que ya cuentan con uno, pero funcionan de forma deficiente en sus actividades operacionales. La presente tesis se realizó en base a Programas anuales de SSO de organizaciones mineras certificadas en normas internacionales, además de requisitos legales, estadísticas de accidentes en minería, tanto superficial como específicamente en PAD de lixiviación, procedimientos de SSO, análisis de riegos basado en IPERC y la identificación de los elementos componentes de la herramienta de mejora continua PHVA. Finalmente, se espera que los niveles de accidentabilidad puedan reducirse con la implementación del modelo de PASS; si bien no es la única herramienta, esta establecerá un camino a seguir. Además, promoverá la inversión minera en el país, debido a que las estadísticas demostrarán la mejora en el Sistema de Gestión de Seguridad y Salud Ocupacional, lo cual resaltará el valor del recurso humano dentro de la organización y la importancia de alentar la cultura de prevención. / In recent years, within the framework of surface mining activity in Peru, a high number of accidents have occurred due to the weak application of the Occupational Health and Safety Management Systems. This problem impacts on the health and well-being of the employee and, by the side of the mining company, generates economic losses and a negative social impact. In this context, this research work seeks to propose a model of the Annual Occupational Health and Safety Program for the construction activities of leach PADs according to the PDCA methodology and based on the D.S. Nº024 - 2016 - EM. This model will establish guidelines, procedures, and minimum requirements so that the organization can prevent, control, and reduce accidents associated with its personnel in the project. Likewise, it is intended that the Annual Occupational Health and Safety Program proposed can serve as a model for other mining companies; which will establish a pattern both for surface mines that are in project; as for those that already have one, but function poorly in their operational activities. This thesis was carried out based on legal requirements, statistics of open pit accidents in recent years, Occupational Health and Safety procedures such as IPERC and the identification of the component elements of the PDCA continuous improvement tool. Finally, it is expected that accident rates can be reduced with the implementation of the Annual Occupational Health and Safety Program model; while it isn’t only a tool or procedure, it will establish a way forward. In addition, it will promote mining investment in the country, since the statistics will demonstrate the improvement in the Occupational Health and Safety Management System, which will highlight the value of human resources within the organization and the importance of encouraging a prevention culture. / Tesis
169

Security Management : Fulfillment of the Government Requirements for a component assurance process

Kukuruzovic, Naida January 2016 (has links)
Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. The problem that this master’s thesis project addressed was to propose a component assurance process for the Swedish Armed Forces. This process has to be followed in order for a solution or product to be approved at a specific component assurance level. This problem was solved by first performing market research regarding security management. Various security management approaches were examined and the top security management solutions were selected. These solutions were then compared with the assurance requirements stated in Swedish Armed Forces’ KSF v3.1 (Swedish: “Krav på IT-säkerhetsförmågor hos IT-system”, English: Requirements for IT security capabilities of IT systems). This documentation lists the requirements for information technology (IT) security capabilities of IT systems. The solution that satisfied the most of these requirements was selected and modified in order to satisfy the full set of requirements. Finally, a component assurance process is proposed. This process may be used to decide which solutions or products can be used, along with the manner in which each solution or product should be used. The impact of having a component assurance process is that all the solutions and products are approved to a specific component assurance level exclusively based on this process. The ability to include such requirements in the acquisition of any product or service provides the Swedish Armed Forces with assurance that all products or services are approved to specific assurance levels in the same manner and hence provides the Swedish society with assurance that procedures within the Swedish Armed Forces are documented and protect the interests of the country and its citizens. / För varje organisation är det nödvändigt att skydda information från olika säkerhetshot. Att ha en effektiv säkerhetshantering är avgörande för att kunna skydda informationen. Denna process är komplex och många krav måste tillfredsställas. Problemet som detta examensarbete avser att lösa handlar om hur införandet av en assuransprocess kommer påverka Försvarsmakten. Denna process måste följas för att en lösning eller produkt ska godkännas till en specifik komponents säkerhetsnivå. Frågeställningen besvaras i första hand av en marknadsundersökning om säkerhetshantering. Olika säkerhetshanteringsstrategier undersöktes och de bästa säkerhetslösningar valdes. Lösningarna jämfördes därefter med de assuranskrav som anges i Försvarsmaktens KSF V3.1 (Krav på IT säkerhetsförmågor hos IT – system) som är den dokumentation som anger kraven för IT säkerhetsfunktioner i ett IT system. Lösningen som uppfyllde de flesta kraven valdes och modifierades för att uppfylla samtliga kraven. Slutligen rekommenderades en komponent assuransprocess, vilken skulle kunna användas för att avgöra vilken lösning eller produkt som skulle kunna användas samt på vilket sätt det skulle kunna användas. Möjligheten att införa sådana krav i förvärvet av vilken produkt eller tjänst det än gäller förser Försvarsmakten med garantier för att alla produkter eller tjänster är godkända enligt särskilda säkringsnivåer på samma sätt och därmed försäkras det svenska samhället att förfaranden inom svenska väpnade krafter dokumenteras samt skyddar landet och dess medborgare. / Säkerhetshantering, informationssäkerhet, autentisering, auktorisering, styrning, riskhantering, följsamhet, användaradministration
170

Design and evaluation of a secure, privacy-preserving and cancelable biometric authentication : Bio-Capsule

Sui, Yan 04 September 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / A large portion of system breaches are caused by authentication failure either during the system login process or even in the post-authentication session, which is further related to the limitations associated with existing authentication approaches. Current authentication methods, whether proxy based or biometrics based, are hardly user-centric; and they either put burdens on users or endanger users' (biometric) security and privacy. In this research, we propose a biometrics based user-centric authentication approach. The main idea is to introduce a reference subject (RS) (for each system), securely fuse the user's biometrics with the RS, generate a BioCapsule (BC) (from the fused biometrics), and employ BCs for authentication. Such an approach is user-friendly, identity-bearing yet privacy-preserving, resilient, and revocable once a BC is compromised. It also supports "one-click sign on" across multiple systems by fusing the user's biometrics with a distinct RS on each system. Moreover, active and non-intrusive authentication can be automatically performed during the user's post-authentication on-line session. In this research, we also formally prove that the proposed secure fusion based BC approach is secure against various attacks and compare the new approach with existing biometrics based approaches. Extensive experiments show that the performance (i.e., authentication accuracy) of the new BC approach is comparable to existing typical biometric authentication approaches, and the new BC approach also possesses other desirable features such as diversity and revocability.

Page generated in 0.0839 seconds