National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Transfer of Security Email Proxy into Embedded Device
Richter, Jan ; Pecho, Peter (referee) ; Schäfer, Jiří (advisor)
This bachelor's thesis deals with embedded devices and their operating systems analysis for transfer of security email proxy into one of these devices. It also describes already existing project Mailproxy and techniques of email securing.
Email Communication Problematics
Tlusťák, Karel ; Pecho, Peter (referee) ; Malinka, Kamil (advisor)
This work describes actual problems regarding to email communication. It shows how emails technically work and on these bases describes today's possibilities of email authentication. Next to it, the paper focuses on the biggest problems connected to emails - spamming and phishing. As far as spam is concerned, this work is dealing with methods of detection and filtering spam.  Phishing is demonstratively shown on virtual case of phish-attack and attention is paid to anti-phishing tools as well. Other key-part of this work is low view of email problematic. This part covers judgement and eventual punishment of spamming and phishing in accordance to Czech, European Union and other countries' legislation. The phishing, considered to be the most serious problem concerning to emails, is demonstrated by the virtual court case which shows how related organs works and what are the problems about it. Some precedential cases are discussed there as well. The last part of this work describes the implementation of simple program which uses database in the Phishtank server to analyse phishing emails.
Secure Authentication and Access Control in Web Applications
Čižek, Martin ; Pecho, Peter (referee) ; Samek, Jan (advisor)
This thesis deals with security of web based applications and their access controlling. The work describes security of applications in WWW environment and security elements that help us to secure those systems against possible attacks. Authentication methods used in PHP applications are described in more detailed way with their advantages and disadvantages with consideration on security and usability.
Secure Authentication and Access Control in Web Applications
Čižek, Martin ; Pecho, Peter (referee) ; Samek, Jan (advisor)
This thesis deals with security of web based applications and their access controlling. The work describes security of applications in WWW environment and security elements that help us to secure those systems against possible attacks. Authentication methods used in PHP applications are described in more detailed way with their advantages and disadvantages with consideration on security and usability.
Email Communication Problematics
Tlusťák, Karel ; Pecho, Peter (referee) ; Malinka, Kamil (advisor)
This work describes actual problems regarding to email communication. It shows how emails technically work and on these bases describes today's possibilities of email authentication. Next to it, the paper focuses on the biggest problems connected to emails - spamming and phishing. As far as spam is concerned, this work is dealing with methods of detection and filtering spam.  Phishing is demonstratively shown on virtual case of phish-attack and attention is paid to anti-phishing tools as well. Other key-part of this work is low view of email problematic. This part covers judgement and eventual punishment of spamming and phishing in accordance to Czech, European Union and other countries' legislation. The phishing, considered to be the most serious problem concerning to emails, is demonstrated by the virtual court case which shows how related organs works and what are the problems about it. Some precedential cases are discussed there as well. The last part of this work describes the implementation of simple program which uses database in the Phishtank server to analyse phishing emails.
Transfer of Security Email Proxy into Embedded Device
Richter, Jan ; Pecho, Peter (referee) ; Schäfer, Jiří (advisor)
This bachelor's thesis deals with embedded devices and their operating systems analysis for transfer of security email proxy into one of these devices. It also describes already existing project Mailproxy and techniques of email securing.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.