National Repository of Grey Literature 19 records found  previous11 - 19  jump to record: Search took 0.01 seconds. 
Safety of E-commerce
Jonáš, Martin ; Beroun,, Ivo (referee) ; Dvořák, Jiří (advisor)
Diplom´s thesis is supposed to formulation safety of information system functions, description of elktronic signature and certificion authority. Next is oriented at conversion, launching and application of elektronic signature.
Proposing a Risk Analysis Methodology for Critical Applications in the Banking Sector
Zajíček, Juraj ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
This diploma thesis deals with the problem of risk analysis of critical applications in banking. The sponsor is the bank operating in the Czech Republic. The thesis is based on the theoretical apparatus in the field of information security and legal normatives of the Czech Republic. The thesis analyzes the laws and directives related to the issue of risk analysis, the bank's internal regulations and the previous analyzes carried out in the bank.
New Trends in International Commercial Arbitration
Nosek, Jakub ; Dobiáš, Petr (advisor) ; Brodec, Jan (referee)
New Trends in International Commercial Arbitration Abstract: The purpose of my thesis is to analyze two leading trends in international commercial arbitration. Those trends are (i) the influence of electronic means of communication on arbitration proceedings and (ii) confidentiality and its actual development in respect to implied duty of confidentiality in arbitration proceedings. The main methodology of research was to compare recently revised arbitration rules with its previous wordings (UNCITRAL Rules, ICC Rules, SCC Rules and CAM Rules) and examine changes related to the above enlisted topics. Furthermore diverse sources were used in the thesis such as arbitration rules of different institutions, experts' publications and also e-mail correspondence with representatives of observed arbitration institutions. The thesis is composed of three chapters. The first chapter summarizes actual revisions of observed arbitration rules without making any conclusions. The second chapter describes the influence of modern technologies on arbitration proceedings. The chapter consists of four parts. The first part introduces online arbitration and presents possible ambiguities in this term. The second part focuses on specific stages of arbitration proceedings and analyzes in detail, how those stages are influenced by...
Safety of e-business
Jonáš, Martin ; CSc, Ivo Beroun, (referee) ; Dvořák, Jiří (advisor)
Bachelor´s thesis is supposed to formulation safety of information system functions, description of elktronic signature and certificion authority. Next is oriented at conversion, launching and application of elektronic signature.
Data-efficient security of cloud storages
Elis, Martin ; Fujdiak, Radek (referee) ; Člupek, Vlastimil (advisor)
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own design of possible realization. In the next part of the document, process of building a safe cloud data storage is described together with principles of ensuring its security. In the conclusion, the author focuses on comparison of cryptographic algorithms and their behavior depending on the length of a used keys.
Analysis of Selected Security Protocols
Říha, Tomáš ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis deals with the SRI Constraint Solver tool used for analysis of security protocols. The tool is shortly characterised, and its syntax is shown on an implementation of the Needham-Schroeder Public Key protocol. The practical part shows some examples of analysed protocols. Every protocol is specified; it's run in the tool, published attack and found attack in case of its presence. At the end of the thesis, a method of analysis of each protocol and a comparison of achieved results with published are described.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Security in hybrid cloud computing
Koudelka, Ondřej ; Karkošková, Soňa (advisor) ; Šperková, Lucie (referee)
This bachelor thesis deals with the area of hybrid cloud computing, specifically with its security. The major aim of the thesis is to analyze and compare the chosen hybrid cloud providers. For the minor aim this thesis compares the security challenges of hybrid cloud as opponent to other deployment models. In order to accomplish said aims, this thesis defines the terms cloud computing and hybrid cloud computing in its theoretical part. Furthermore the security challenges for cloud computing are defined and specified for hybrid cloud. The comparison of specific hybrid cloud providers is provided in the practical part along with the comparison of hybrid cloud security challenges.
Risk Analysis for establishing of new application into the information system in banking
Štefek, Ivan ; Doucek, Petr (advisor) ; Klas, Jan (referee)
Bachelor thesis Risk Analysis for the establishing of new application into the information system in banking deals with the management of information security and Risk Analysis. Thematically is thesis divided into two parts, theoretical part and practical part. In the theoretical part I inform the reader with the concept of information security and three basic components. I am going to tell about the basic methodology for IT management. In the end I am going to tell something about threats and their impacts. The practical part is based on a summary of theoretical knowledge and there is a practical example. In my example of application My Bank I try to show the information risk analysis. Risk analysis consists of three main parts. In the first part is information classified in the application. There are three points of view, first is confidentiality, second is integrity and third is availability. In second part I try to look at threats and evaluate according to their likelihood. The final section compares the building secure of application with security, which should application have according to degree of risk classification.

National Repository of Grey Literature : 19 records found   previous11 - 19  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.