National Repository of Grey Literature 44 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Web applications and the influence of an encryption on their responses
Podavka, Jan ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis deals with how the size of the database and response of the system is influenced by an encryption of the data on the websites. This issue is solved by means of testing of encryption methods on the Raspberry Pi. Theoretical part of the thesis describes the encryption algorithms. It also describes how to secure the website and where to use the encryption on the web and what kind of encryption to use. The practical part focuses on the impact of the encryption on the system. As a result, the speed of the algorithms in different situations is evaluated, and also the size of the database with cypher text and plain text is compared.
The Problematics of Phishing
Kemr, Jakub ; Klíma, Tomáš (advisor) ; Pavlíček, Luboš (referee)
Bachelor thesis focuses on still current and specific type of cybercrime called phishing. The goal of the thesis is to introduce an ordinary internet user to the phishing issue by describing the functionality of different techniques of attack and appropriate ways of prevention and defence against these types of cyber-attacks. The thesis is divided into three parts. Theoretical part deals with the introduction to the phishing issue and historical development of this fraudulent technology since the early 90s of the 20th century. Furthermore, the theoretical part describes the functionality of different types of phishing techniques from the most famous to the less well-known. The end of the theoretical part describes the prevention and defence possibilities at user, software and organizational level. The second part of the work focuses on the analysis of phishing attacks. First the thesis analyses some of the recent attacks on Czech clients, in particular their structure, progress and the real purpose. The following parts show the preparation and process of one classic and one modern attack with examples of detection and possibilities of appropriate defence against these specific techniques. Final part of the thesis shows the results of the survey and phishing quiz, focused on ordinary internet users and their awareness of this issue.
The issues of the website design process
Melena, Lukáš ; Sova, Martin (advisor) ; Klíma, Tomáš (referee)
The theme of this bachelor's thesis is to provide the overview of the website design process. The main object is to create and apply methodology of this process. The thesis is divided into three parts. The first part is about introducing SEO focused mainly on the website design. The second part is devoted to creation of the methodology and in the third part the methodolgy is applied to the real project. The thesis is devoted mainly for project managers and the webmasters. The website design still does not have any standardized or comprehensive procedure so they can find here the insight into the issue.
CERT / CSIRT teams and cyber security
Rezníčková, Dominika ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The main goal of this bachelor thesis is to provide brief description of contemporary situation in the field of cyber security and the role of national CERT team in it according to the newly adopted Law no. 181/2014 Coll., on Cyber Security and to make comparison of theoretical principles with their applying in praxis. Thesis is divided into two main parts. First one, a theoretical part, comprehends basic information on cyber security, cybercrime and security incidents and consequently focuses on roles of CERT / CSIRT teams in a perspective of security incidents and cyber security in general, reasons for a formation of the first CERT team and following development, its functions and responsibilities nowadays and finally the thesis presents possible opportunities of collaboration between CERT teams within international organisations and platforms. The second part of the thesis is practical and consists of content analysis of The Law on Cyber Security and its consequences and impacts. The main focus of the thesis is set up on explaining a role of a national team and its sphere of authority in the Czech Republic after the law has entered into force. To provide information about practical operation directly from the source, I will interview two cyber security specialists working in The National CSIRT Team of the Czech Republic called CSIRT.CZ, which is currently operated by the association CZ.NIC. Among other information, I will include a specific example of coordinating activity happened under the auspices of the team during the security incident. As a conclusion of this work is a summary of the achievements and benefits of work depending on the previous foreground and the comparison.
The Web 2.0 environment and its usage in business corporations
Kapusta, Matúš ; Pavlíček, Antonín (advisor) ; Klíma, Tomáš (referee)
The main goal of my Bachelor thesis is to bring basic information about the Web 2.0 environment and its advantages for business corporations. In the first part of thesis I define the Web 2.0 environment and the key differences betweet Web 2.0 and Web 1.0. Next I describe specific advantages which firms can achieve by implementation of Web 2.0 environments elements in relationships inside the firm, relationships with costumers and relationships with business partners. The next part is primarly oriented upon social networks and I describe various tools and techniques which can be used to analyze advertising pages on social networks. The added value of my work is in analysis of a company and the method it uses social media sites. After a detailed analysis constructed with a chosen tool I purpose some changes that could improve the actual state.
Vulnerability Management in the Corporate IT Infrastructure
Hronek, Tomáš ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
The present thesis deals with the area of vulnerability management and its relation to information security. Its main purpose is to set the topic of vulnerability management in context of company information security and to explain its relationship to related disciplines. In the practical part, selected vulnerability assessment tools are compared and methodology is applied to determine the criticality of the vulnerabilities identified in relation to the provided IT services. The objectives were achieved by literature review, personal consultations with employees responsible for information security at J&T Bank and by comparing the results of several tools for assessing vulnerability (Nessus, Retina, OpenVAS, Nexpose, Tripwire). To date, there has not been published a thesis devoted exclusively to the topic of vulnerability management. This thesis is the first one to provide comparable results of vulnerability scanning of the same targets. Equally valuable is the application of Common Vulnerability Scoring System to determine the criticality of the vulnerabilities identified in relation to delivered IT services.
Bitcoin
Herzán, Jiří ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
Bachelor's thesis is focused on crypto currency bitcoin. The thesis is divided into three parts. First chapter is focused on cryptography, which is used for bitcoin security. Next chapter describes basic bitcoin principles and bitcoin mining. In last chapter there are practically described two methods of bitcoin mining. The aim of this thesis is to bring coherent view on given themes, especially bitcoin mining. The main goal of this thesis is trying bitcoin mining using ASIC miner and Cloud mining method. The result is a statement about mining profitability.
Comparison of selected software tools in an environment Darknet
Bušta, Jan ; Klíma, Tomáš (advisor) ; Sova, Martin (referee)
This thesis focuses on issues related to a Darknet. The main goal of this thesis is to describe the Darknet network, characterize selected software that allows connections to the Darknet, compare these software and recommend potential users the software, that best suits the given criteria. The first part is devoted to the theory of the Darknet and describes the Darknet from a historical and content perspective. It further describes the software by which you can get into the Darknet. In the second part are compared these software by using pre-defined criteria. In the conclusion is evaluated software I2P as the best solution for potential users.
Social networks and their misuse
Průcha, Šimon ; Pavlíček, Antonín (advisor) ; Klíma, Tomáš (referee)
This thesis concentrates is about influence and abuse of social networks on the infor-mation society of today. The work is divided into two general parts. The first part deals with the theoretical part of the issue. There are terms such as: data, information, knowledge, social networking and communication. These concepts are discussed with regard to the issue being addressed and how it can contribute. The second part is devoted to an experiment on the social network Facebook. Discusses creating fake profiles and the possibility of their misuse. There is also a comparison with already the passed experiment. Outcome of this work is to evaluate the success of the experiment and evaluate its im-pact on today's society.
Anonymization tools on the Internet
Techlovský, Stanislav ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The Bachelor thesis deals with anonymizing user on the Internet and with the use of different anonymization tools. The first part describes the causes and threats in the event of disturbance anonymous users on the Internet. It also acquaints the reader with the environment that allows anonymous and main anonymization tools. The second part is focused on the Raspberry Pi minicomputer and its configuration and usage as TOR anonymizing tool. The conclusion is devoted to comparing the main anonymization tools with modifications Raspberry Pi Onion Routing and evaluation.

National Repository of Grey Literature : 44 records found   beginprevious21 - 30nextend  jump to record:
See also: similar author names
18 Klima, Tomáš
18 Klíma, Tomáš
Interested in being notified about new results for this query?
Subscribe to the RSS feed.