National Repository of Grey Literature 76 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Information Security in Energetics
Straževský, Martin ; Lieskovan, Tomáš (referee) ; Hajný, Jan (advisor)
This bachelors thesis focuses on analysis of vulnerabilities of DLMS/COSEM protocol, DoS (Denial of Service) attack and load test execution on smart grid components -- smart meters. Thesis implements load tester application that can test given components load resistance based on input parameters, that affect predefined load profile consisting of phases and periodically checks whether the component is responding after each phase.
Proposal for Changes to the Information System of Small Business
Hutyra, Petr ; Koch, Miloš (referee) ; Dydowicz, Petr (advisor)
This bachleor thesis focuses on the assessment and proposal for changes to the information system of HCV group a.s. company. During its processing analysis was carried out on theoretical foundations as well as an analysis of the current information system within the company. Finally, based on these analyses a proposal was put forward to provide a solution that will contribute to the efficiency and operation of the whole system within the company.
Security GAP analasys in enterprise environment
Sommer, Vojtěch ; Kornelly, Aleš (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with level of information security in selected company environment. For this purpose, a security GAP analysis will be performed based on the recommended standard ISO/IEC 27002. Based on the performed analysis a proposal of security precautions is suggested, which should reduce risk of threats under the acceptable level and also should no longer be in conflict with mentioned standard.
Comparison of education information and cybernetic security in Czech republic and South Korea with suggestions for improvement
Šisler, Marcel ; Zápotočný, Matej (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with a suggestions to improve the current state of education information and cyber security in the Czech Republic. These suggestions are from a comparison of education at the Brno University of Technology - Faculty of Business and Hallym University in South Korea. Another part is the analysis of trends in the field of cyber attacks and comparison of this area between the Czech Republic and South Korea.
Simulating information security management within a university environment
Hložanka, Filip ; Martina,, Chitu (referee) ; Sedlák, Petr (advisor)
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network using a sophisticated cybernetic polygon. The security of the network is then assessed after several iterations of the simulations. Its parameters are adjusted in the effort to increase its security and the module is tested on an academic employee in order to assess its effectiveness. The conclusion evaluates the possibilities of increasing the security of the simulated network as well as the usability of the cybernetic polygon in practice.
Analysis and Design of Information System
Řezáč, Vojtěch ; Koch, Miloš (referee) ; Dydowicz, Petr (advisor)
The content of the thesis is analysis of information system in Poclain Hydraulics and proposal of changes for increasing the efficiency and security to in-house processes. The result will give well arranged access to data on the intranet, reduced internet usage and staff monitoring system that can increase security and productivity.
Security games "Capture The Flag"
Karabina, Lukáš ; Pospíšil, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
Bachelor’s thesis is focused on providing general information about "capture the flag" security games. It deals with the basic categorization of this type of games, it also describes various categories for tasks that can be included within these games. The thesis analyzes selected available platforms for organizing "capture the flag" security games. At first the thesis deals with security games in general, then deals with basic categorization of tasks, that are often included in these games, then continues with the issue of selecting a suitable platform for the practical part of the thesis to support the courses dealing with cryptography and cyber sercurity. Finally, thesis discribes the individual tasks that were implemented in its practical part.
Honeypot/Honeynet as modern services for classical information networks
Karger, David ; Blažek, Petr (referee) ; Fujdiak, Radek (advisor)
This work describes honeypots, their definition, clasification and logging possibilities. In the practical part honeypots are tested for the services that are most often attacked, their installation is performed and tests are made for basic familiarization with the functionality of the honeypot. Furthermore, the honeypot is exposed to the Internet and the obtained data are analyzed.
Web Application Penetration Testing Automation
Dušek, Daniel ; Polčák, Libor (referee) ; Pluskal, Jan (advisor)
Tato práce má dva cíle - navrhnout obecně aplikovatelný přístup k penetračnímu testování webových aplikací, který bude využívat pouze nedestruktivních interakcí, a dále pak implementovat nástroj, který se tímto postupem bude řídit. Navrhovaný přístup má tři fáze - v první fázi tester posbírá požadavky pro testovací sezení (včetně požadavků na nedestruktivnost) a připraví si nástroje a postupy, kterých při testování využije, následně začne s průzkumem. V druhé fázi využije dodatečných nástrojů pro zpracování informací z předchozí fáze a pro ověření a odhalení zranitelností. Ve třetí fázi jsou všechny informace překovány ve zprávu o penetračním testování. Implementovaný nástroj je postavený na modulech, které jsou schopny odhalení reflektovaného XSS, serverových miskonfigurací, skrytých adresních parametrů a skrytých zajímavých souborů. V porovnání s komerčním nástrojem Acunetix je implementovaný nástroj srovnatelný v detekci reflektovaného XSS a lepší v detekci skrytých zajímavých souborů. Práce také originálně představuje nástroj pro sledování postranního kanálu Pastebin.com s cílem detekce utíkajících informací.
Implementation of ISMS security countermeasures proposal for a company
Vyhňák, Petr ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
The master thesis deals with the proposal of introduction security countermeasures in accordance with the information security management system for the company. The theoretical part is defined in the first part of the thesis. The next part introduces the company, describes the current state of security and analysis security countermeasures with the help of supporting material. The last part includes the proposal to introduce new security countermeasures. The thesis includes risk analysis, design of selected security countermeasures including the implementation procedure with a time schedule and economic evaluation.

National Repository of Grey Literature : 76 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.