National Repository of Grey Literature 10 records found  Search took 0.00 seconds. 
The Potential of Cyber Threats in the Critical Energy Infrastructure
Starý, Jan ; Schmidt, Nikola (advisor) ; Karásek, Tomáš (referee)
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy infrastructure. Main emphasis is put on the concept of smart grids as possible solution of decentralization. In these terms technical means of security are studied especially with emphasis on SCADA (Supervisory Control And Data Acquisition) systems and the Internet as one of the essential component of communication in modern communication technologies.
Hledání zpravodajství z lidských zdrojů: Měnící se role HUMINT v rámci americké zpravodajské komunity po 9/11
Lochovský, Jan ; Bureš, Oldřich (advisor) ; Schmidt, Nikola (referee)
Diploma thesis tracks changes of approach to the clandestine human intelligence collection (HUMINT) as part of a wider process of the United States Intelligence Community reform after the September 11 terrorist attacks. Using longitudinal comparative analysis, the author observes which key factors enabling successful HUMINT collection were significantly improved and which were neglected, thus constraining a highly desirable development of this intelligence collection technique so important in combating asymmetric threats such as terrorism. Following factors were identified as critical in improving HUMINT: institutional anchoring of HUMINT, adaptation of operational techniques to successfully monitor decentralized terrorism, 'dependence' of the US intelligence community on technological means of intelligence collection, and availability of qualified and especially linguistically adept intelligence professionals in responsible agencies. Keywords CIA, DIA, HUMINT, intelligence, reform, terrorism, United States of America
The Birth of Cyber as a National Security Agenda
Schmidt, Nikola ; Hynek, Nikola (advisor) ; Stevens, Timothy Charles (referee) ; Polčák, Radim (referee)
The following dissertation studies the question how cyber security has become a national security agenda and discusses implications of the observed processes to current international security status quo. I divided the research into three parts. The first part embodies theoretical and methodological approach. The second part studies three distinct discourses related to cyber security, the techno-geek discourse, the crime-espionage discourse and the nation-defense discourse using the method of Michel Foucault about archaeology of knowledge. The third part then draws on these three discourses and discusses implications through lens of several theoretical perspectives. Namely through concepts taken from science and technology studies, from actor network theory and network assemblages. The critical point of the research is a distinct reading of these discourses. While techno-geeks are understood as a source of semiosis, hackers' capability and crypto-anarchy ideology influenced by cyberpunk subculture, the cyber-crime and espionage discourse is read as a source of evidence of the hackers' capability. The inspiration in popular subculture is combined with current efforts in development of liberating technologies against oppression by authorities, oppression recognized by the eyes of the crypto-anarchist...
The potential improvement of the cyber security strategies
Jandura, Lukáš ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
The thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible. Powered by TCPDF (www.tcpdf.org)
The potential improvement of the cyber security strategies
Jandura, Lukáš ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
The thesis is focused on central nodes' dynamics in cyberspace, representing its key elements. This approach is derived from the theory of networks developed by Albert-László Barabási and applied on different aspects of cyberspace, which brings different views at known events and issues and discovers relationship between central and common nodes. Cyberspace is perceived in its broadest shape as a fluid result of social constructivism influenced by behaviour of its users. Final outcomes are summarised to recommendations for a new approach to a cybersecurity strategy. Powered by TCPDF (www.tcpdf.org)
The Conundrum of Cybersecurity: Concepts, Modalities and Threat Framing of the European Union
Rozsypal, Jakub ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
This thesis deals with the complex issue of cyber security in international relations, specifics of cyber realm due to its technical nature and particular circumstances of its development as well as with the way how the EU deals with information and communication technologies. Even though cyber security as a category appears with increasing frequency and intensity in the thinking on security and related political debate in the past twenty years, some of its basic tenets are still insufficiently understood. First part of the thesis deals with cyber realm and its specifics as such with effort to pinpoint some of the inherent contradictions between the traditional Westphalian nation states and the fluid character of the digital world. Through analysis of selected relevant incidents as well convincing absence of the "digital- doom" scenarios the peculiar expectation-reality discrepancy will be analysed. The overarching method departs from intersubjective securitization framework. In the last part analysing the EU it is the concept of threat framing that is applied to study and trace the narrative of the EU in these matters. Here a gradual construction of a narrative termed ICT as "fundamental societal building block" reveals itself with cyber related issues making its way into top policy levels through...
Cyber Security: US - Chinese Relations
Debnárová, Barbora ; Střítecký, Vít (advisor) ; Schmidt, Nikola (referee)
This diploma thesis deals with cyber relation of the United States of America and the People's republic of China. The aim of this diploma thesis is to answer the following questions: What kind of cyber threat for the United States does China represent? How is China's cyber strategy characterised? How do USA react on this threat and what are the gaps in this reaction? The thesis is divided into four chapters. The first chapter deals with definition of cyberwarfare and its perception in Chinese context. The second chapter analyses USA - China relation and its implication for cyber security. The third chapter represents US reaction on Chinese cyber threat. The last chapter deals with the gaps in the reaction. Keywords USA, China, cyber threat, cyberwarfare, cyber espionage
Hledání zpravodajství z lidských zdrojů: Měnící se role HUMINT v rámci americké zpravodajské komunity po 9/11
Lochovský, Jan ; Bureš, Oldřich (advisor) ; Schmidt, Nikola (referee)
Diploma thesis tracks changes of approach to the clandestine human intelligence collection (HUMINT) as part of a wider process of the United States Intelligence Community reform after the September 11 terrorist attacks. Using longitudinal comparative analysis, the author observes which key factors enabling successful HUMINT collection were significantly improved and which were neglected, thus constraining a highly desirable development of this intelligence collection technique so important in combating asymmetric threats such as terrorism. Following factors were identified as critical in improving HUMINT: institutional anchoring of HUMINT, adaptation of operational techniques to successfully monitor decentralized terrorism, 'dependence' of the US intelligence community on technological means of intelligence collection, and availability of qualified and especially linguistically adept intelligence professionals in responsible agencies. Keywords CIA, DIA, HUMINT, intelligence, reform, terrorism, United States of America
The Potential of Cyber Threats in the Critical Energy Infrastructure
Starý, Jan ; Schmidt, Nikola (advisor) ; Karásek, Tomáš (referee)
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy infrastructure. Main emphasis is put on the concept of smart grids as possible solution of decentralization. In these terms technical means of security are studied especially with emphasis on SCADA (Supervisory Control And Data Acquisition) systems and the Internet as one of the essential component of communication in modern communication technologies.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.