Template-Type: ReDIF-Article 1.0 Author-Name: Tomáš Klíma Title: PETA: Methodology of Information Systems Security Penetration Testing Abstract: Current methodologies of information systems penetration testing focuses mainly on a high level and technical description of the testing process. Unfortunately, there is no methodology focused primarily on the management of these tests. It often results in a situation when the tests are badly planned, managed and the vulnerabilities found are unsystematically remediated. The goal of this article is to present new methodology called PETA which is focused mainly on the management of penetration tests. Development of this methodology was based on the comparative analysis of current methodologies. New methodology incorporates current best practices of IT governance and project management represented by COBIT and PRINCE2 principles. Presented methodology has been quantitatively evaluated. Keywords: IT security, Methodology, IT security audit, Penetration testing Pages: 98-117 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=88.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/139 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:88:p:98-117 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/88 Template-Type: ReDIF-Article 1.0 Author-Name: Jan Lánský Title: Analysis of Cryptocurrencies Price Development Abstract: Cryptocurrencies are a type of digital currencies based on cryptography principles. Cryptocurrencies are a unique combination of three characteristics: they provide anonymity, they are independent of central authority and they provide protection from double spending attack. The aim of this paper is to capture trends in the area of significant cryptocurrencies price developments and to explain their causes. The current research in this area is exclusively limited to an analysis of the price developments of the most important Bitcoin cryptocurrency; our research is the first to focus on other cryptocurrencies too. The economic perspective on cryptocurrencies is based on IT knowledge regarding the principles of their functioning. We have created a database of prices of 1278 cryptocurrencies from 2013 to 2016. This database is publicly available. To analyse the data, SQL query language was used. Keywords: SQL, Cryptocurrency, Price bubble, Price development, Altcoin Pages: 118-137 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=89.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/148 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:89:p:118-137 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/89 Template-Type: ReDIF-Article 1.0 Author-Name: Nesrine Lahiani Author-Name: Djamal Bennouar Title: A DSL-based approach to Product Derivation for Software Product Line Abstract: Product derivation is an important part of the Software Product Line (SPL) development process. The quality of a product derivation process has a direct impact in decreasing software product costs and time-to-market. In this paper, we present an approach that represents the SPL with a set of integrated models and automatically derives executable products with model transformations. We combine SPL and Model-Driven Engineering (MDE) into a comprehensive and extremely effective framework in order to get advantages of both techniques. In order to evaluate the feasibility of our approach, we have designed and implemented it using existing and available technologies. Keywords: Product derivation, Software product line, Domain specific language, Model driven engineering Pages: 138-143 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=90.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/157 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:90:p:138-143 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/90 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Paralič Title: Identification of the QRS complex in the ECG Abstract: The cardiovascular heart diseases are one of the most common causes of leading to death of man. Unfortunately, the symptoms vary and the most common reason for critical delays in medical treatment is lack of early warning and patient unawareness. In this paper, we present a development of the mobile application for Electrocardiogram measurements based on communication with a smart clothing using Bluetooth. The objectives of the application are a wireless data collection and analysis of ECG signal. The analysis is aimed for precise detection of QRS complex parameters plus detection of P-wave and T-wave. Measurement and evaluation of multiple PQRST parameters in a series allows detection of anomalies which leads to different heart diseases. Early warning system can help to make preventive actions to avoid severe heart disease. The recorded data are exported to format of the MIT/BIH arrhythmia database to be compatible with the professional medical software. This program will be devoted to the purposes of research and home healthcare instead of clinical diagnosis. Keywords: mobile application, ECG monitoring, ECG signal, Signal processing, QRS complex, Monitorovanie EKG, EKG signál, spracovanie signálu, mobilná aplikácia, QRS komplex Pages: 144-161 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=91.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/158 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:91:p:144-161 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/91 Template-Type: ReDIF-Article 1.0 Author-Name: Pavel Náplava Title: Evaluation of Cloud Computing Hidden Benefits by Using Real Options Analysis Abstract: Cloud computing technologies have brought new attributes to the IT world. One of them is a flexibility of IT resources. It enables effectively both to downsize and upsize the capacity of IT resources in real time. Requirements for IT size change defines business strategy and actual market state. IT costs are not stable but dynamic in this case. Standard investment valuation methods (both static and dynamic) are not able to include the flexibility attribute to the evaluation of IT projects. This article describes the application of the Real Options Analysis method for the valuation of the cloud computing flexibility. The method compares costs of the on-premise and cloud computing solutions by combining put and call option valuation. Cloud computing providers can use the method as an advanced tool that explains hidden benefits of cloud computing. Unexperienced cloud computing customers can simulate the market behavior and better plan necessary IT investments. Keywords: Cloud Computing, Flexibility, Volatility, Total cost of ownership, Net present value, Real options analysis, On-premise, IT infrastructure Pages: 162-179 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=92.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/159 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:92:p:162-179 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/92 Template-Type: ReDIF-Article 1.0 Author-Name: Stanislava Mildeová Author-Name: Antonín Dvořák Author-Name: Pavel Zahradníček Title: Information Framework of Critical Infrastructure Abstract: Information and communication technologies are in connection with security discussed by professional community from many perspectives. The authors perceive information and communication technologies as potential as well as threat to the security environment. The aim of the article is to holistically analyze the basic connection between the information framework and functionality of the critical infrastructure system involved in the activities of the public administration. As a model case is discussed the protection of critical infrastructure against toxic substances. Turbulence of the security environment, conflict transformation into hybrid or asymmetric forms and, as it is proven in the article, a crucial position of informatics in these processes makes this a very actual topic. Keywords: ICT, ICT, systémový přístup, Systems Approach, Information systems, informační systémy, Public administration, veřejná správa, Cybersecurity, Critical infrastructure, Critical information infrastructure, Toxic substance, kritická informační infrastruktura, kritická infrastruktura, kybernetická bezpečnost, toxické látky Pages: 180-191 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=93.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/161 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:93:p:180-191 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/93 Template-Type: ReDIF-Article 1.0 Author-Name: Rudolf Vohnout Author-Name: Zora Říhová Author-Name: Iva Dostálková Title: Electronic Payments Profitability Extent Model Abstract: Cashless payments are recent phenomena, which even increased with the introduction of contactless means like NFC, PayPass or payWave. Such new methods speed-up the entire payment process and in comparison to cash transactions are much simpler and faster. But on the other hand the key question for merchant is if it is worth to have such device, which accept these new payment means or not to have the terminal at all. What is the amount of cash flow, which delimits the cash holdings to be still profitable? This paper tries to give answers to such question by presenting general profitability model, which will address defining the cash threshold amount. The aim is to show that cash holdings could be profitable up to certain amount, but after the threshold is met, cashless payment methods are fairly superior despite their additional costs. Keywords: Cashless, Card, Transaction, Fee, Merchant, Payment, Contactless Pages: 192-207 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=94.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/160 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:94:p:192-207 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/94 Template-Type: ReDIF-Article 1.0 Author-Name: Veronika Vlčková Title: “Vlček Seminars” About the System Approaches at CTU in Prague Abstract: In the academic year 2015-2016 at CTU in Prague, Faculty of Transportation Sciences carried out in a more traditional "Vlček seminars", which take place intermittently since 1999. The purpose of the seminars is to look for new, innovative impulses, systems approach to problem solving, organize knowledges and insights on systems engineering tools and objectives and possible areas of their application. The methodological basis is constructive theory of systems, presented by prof. Jaroslav Vlček. Keywords: systémový přístup, Systems Approach, Systems Engineering, systémové inženýrství, Constructive theory of systems, konstruktivní teorie systémů, Transportation, doprava Pages: 208-217 Volume: 2016 Issue: 2 Year: 2016 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=95.pdf File-URL: https://aip.vse.cz/index.php/aip/article/view/150 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2016:y:2016:i:2:id:95:p:208-217 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/95