National Repository of Grey Literature 9 records found  Search took 0.00 seconds. 
Analysis of Regulatory Requirements in Cyber Security
Valenta, Lukáš ; Loutocký, Pavel (referee) ; Harašta, Jakub (advisor)
This thesis focuses on assessing the impact of NIS2, DORA and GDPR on regulated entities and evaluates the degree of overlap between their regulatory requirements. One of the objectives is the theoretical definition of regulatory overlaps. This overlay is then practically evaluated in the form of a GAP analysis in a selected model company, which compares the current level of cyber security, against the requirements of NIS2, DORA and GDPR. In case of non-compliance, corrective measures are proposed according to best practices. The results of the differential analysis are reflected in the application for a general assessment of the compliance rate in the assessed company.
Security of e-Commerce and Dropshipping
Hanták, Martin ; Harašta, Jakub (referee) ; Loutocký, Pavel (advisor)
The bachelor thesis is devoted to the issue of e-commerce security, in particular to the specific business model of dropshipping. The thesis is divided into two basic parts, theoretical and practical. The theoretical part explains the different types of business models, including the dropshipping model, and the legal aspects related mainly to the dropshipping model. In the second, practical part, the basic goals of the dropshipping e-shop are presented, including the technologies and programming procedures used. The thesis concludes with a code analysis and security recommendations for potential future web application development.
Design of the e-Voting system and its Legal Specifics
Váňa, Vojtěch ; Harašta, Jakub (referee) ; Loutocký, Pavel (advisor)
The thesis focuses on the design of the electronic voting system and its legal specifics. The work focused on the legal aspects of electronic voting, such as voter authentication, data security and guarantee of anonymity of votes. In the theoretical part of the thesis, a survey of the historical development of e-voting and an analysis of the experience of countries that have already implemented this system was conducted. Furthermore, the thesis shows the current situation in the Czech Republic with electronic voting and analyses the relevant legislation related to this issue. The practical part of the thesis contains a concrete proposal for an electronic voting system that combines technological innovations with legal requirements.
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Technological and legal limits of electronic signature in relation to the identification of the signatory
Klimková, Natálie ; Harašta, Jakub (referee) ; Loutocký, Pavel (advisor)
The bachelor thesis is devoted to the issue of digital signatures, in particular advanced digital signatures, in the context of the EIDAS regulation. The first part discusses the legal aspect, defines the legal limits of signatures and analyses the decision-making practice in the Czech Republic. The second part deals with signatures, again mainly advanced, and their limits from a technical point of view. Finally, an application creating and subsequently using an advanced digital signature is presented.
Webpage as digital evidence
Rezek, Jan ; Míšek, Jakub (referee) ; Harašta, Jakub (advisor)
This bachelor’s thesis deals with the issue of securing websites as electronic evidence. It focuses on the analysis of legal regulations and decision-making practice concerning electronic evidence, and on this basis identifies the requirements for its preservation and securing. The thesis also examines the role of hashing functions in maintaining the integrity and authenticity of such evidence. As a result, a tool is designed and implemented for the retrieval and preservation of evidence-quality web content that is consistent with the identified requirements.
Cybersecurity Audit Tool
Štefánik, Jaromír ; Loutocký, Pavel (referee) ; Harašta, Jakub (advisor)
Master thesis deals with the issue of audits in the field of cybersecurity. The theoretical part presents the requirements of a cybersecurity audit according to the ISO/IEC 27000 series of standards, the requirements defined for legally regulated entities according to Act No. 181/2014 Coll., the security measures resulting from Decree No. 82/2018 Coll. and possible changes to national legislation in the field of cybersecurity resulting from the NIS2 Directive. In the practical part of the master thesis, a tool (Python programming language) has been compiled to assist the obliged entities structured by transitions in checking the compliance with the requirements set by the legislation and at the same time generating a summary report of the compliance with the requirements into one complete document together with the attached relevant documentation.
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Detecting semantic relations in texts and their integration with external data resources
Kríž, Vincent ; Vidová Hladká, Barbora (advisor) ; Harašta, Jakub (referee) ; Pecina, Pavel (referee)
We present a strategy to automate the extraction of semantic relations from texts. Both machine learning and rule-based techniques are investigated and the impact of different linguistic knowledge is analyzed for the various approaches. To implement the extraction system RExtractor, several natural language processing tools have been improved: from sentence splitting and tokenization modules to dependency syntax parsers. Furthermore, we created the Czech Legal Text Treebank with several layers of linguistic annotation, which is used to train and test each stage of the proposed system. As a result of the performed work, new Semantic Web resources and tools are available for automatic processing of texts.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.