National Repository of Grey Literature 3 records found  Search took 0.02 seconds. 
Detection of attacks on the L2 layer
Štefánik, Jaromír ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
Bachelor thesis is focused on cybernetic attacks on the second layer of the reference model OSI, namely: DHCP starvation, MAC flooding, Eavesdropping. The first, theoretical, part of the bachelor thesis is focused on the OSI model, types of cybernetic attacks and methods used by cybercriminals (attackers). In the practical part of the bachelor thesis an experimental workplace was set up (local network), the cybernetic attacks were realized, detection algorithms for given attacks were theoretically designed and programs designed to detect the given attacks were created.
Cybersecurity Audit Tool
Štefánik, Jaromír ; Loutocký, Pavel (referee) ; Harašta, Jakub (advisor)
Master thesis deals with the issue of audits in the field of cybersecurity. The theoretical part presents the requirements of a cybersecurity audit according to the ISO/IEC 27000 series of standards, the requirements defined for legally regulated entities according to Act No. 181/2014 Coll., the security measures resulting from Decree No. 82/2018 Coll. and possible changes to national legislation in the field of cybersecurity resulting from the NIS2 Directive. In the practical part of the master thesis, a tool (Python programming language) has been compiled to assist the obliged entities structured by transitions in checking the compliance with the requirements set by the legislation and at the same time generating a summary report of the compliance with the requirements into one complete document together with the attached relevant documentation.
Detection of attacks on the L2 layer
Štefánik, Jaromír ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
Bachelor thesis is focused on cybernetic attacks on the second layer of the reference model OSI, namely: DHCP starvation, MAC flooding, Eavesdropping. The first, theoretical, part of the bachelor thesis is focused on the OSI model, types of cybernetic attacks and methods used by cybercriminals (attackers). In the practical part of the bachelor thesis an experimental workplace was set up (local network), the cybernetic attacks were realized, detection algorithms for given attacks were theoretically designed and programs designed to detect the given attacks were created.

See also: similar author names
2 Štefanik, Jan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.