Thesis topic concerns the issue of information security in corporate environments. Literature search includes information obtained by studying articles and literature in the field of information security. Resources were selected with a focus on the security risks, security technologies and legislative regulation. Attention is focused on technology that supports monitoring of communication flows in the data network. Overview of traffic operating a data network provides important information for the prevention or investigation of security incidents. Monitoring also serves as a source of information for the planning of the network infrastructure. It can detect faults or insufficient transmission capacity. The practical part is dedicated to imp...
This bachelor thesis describes the design and implementation of a monitoring tool into corporate net...
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring an...
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem...
The article addresses the issue of monitoring of the network activity of employee’s computers in ord...
Main focus of this work is on computer network security monitoring. In first part basic definitions ...
The master thesis focuses on the analysis of network traffic monitoring in a selected company and th...
The bachelor’s thesis analyzes the state of cybersecurity events monitoring in the institution and t...
The article defines the role of administration and monitoring of computer networks in financial syst...
Abstract: The detailed description of network scanner functionalities and technologies of ...
The last years brought substantial changes in solutions of problem of access defence to the resourc...
The main purpose of this thesis is to investigate existing information security technologies and i...
In the last years we can observe an increasing number of security incidents varying in their focus, ...
This thesis focuses on description of the current state of research in the detection of network atta...
This diploma thesis is focused on problematics of the industrial networks and offered security by th...
The main purpose of my bachelor thesis is to design and create operation generating system of IoT ne...
This bachelor thesis describes the design and implementation of a monitoring tool into corporate net...
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring an...
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem...
The article addresses the issue of monitoring of the network activity of employee’s computers in ord...
Main focus of this work is on computer network security monitoring. In first part basic definitions ...
The master thesis focuses on the analysis of network traffic monitoring in a selected company and th...
The bachelor’s thesis analyzes the state of cybersecurity events monitoring in the institution and t...
The article defines the role of administration and monitoring of computer networks in financial syst...
Abstract: The detailed description of network scanner functionalities and technologies of ...
The last years brought substantial changes in solutions of problem of access defence to the resourc...
The main purpose of this thesis is to investigate existing information security technologies and i...
In the last years we can observe an increasing number of security incidents varying in their focus, ...
This thesis focuses on description of the current state of research in the detection of network atta...
This diploma thesis is focused on problematics of the industrial networks and offered security by th...
The main purpose of my bachelor thesis is to design and create operation generating system of IoT ne...
This bachelor thesis describes the design and implementation of a monitoring tool into corporate net...
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring an...
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem...