National Repository of Grey Literature 169 records found  beginprevious124 - 133nextend  jump to record: Search took 0.00 seconds. 
Selection of security software for user data protection
Maděra, Jiří ; Havránek, Martin (advisor) ; Benda, Petr (referee)
This work shows overview of potential electronic threats with which present users can come in contact. This topic is very common theme and we can hear about malicious programs or malware almost from the very beginning of computer age. Therefore, in this work, I try to provide view into the most common threats. But the main goal is to find the best solution for protecting user data against malware. Therefore, in the practical part I tested ten most used antivirus programs. The result of this test should show objectively which solution is for the user the most appropriate in terms of several criteria. The criteria that I chose are, detection ability, system memory usage and the total length of the test.
Security technology: Honeypot
Buriánek, Adam ; Halbich, Čestmír (advisor) ; Radomír, Radomír (referee)
The result of the thesis is to characterize the safety technology honeypots, presentation of their capability to monitor security attacks, finding motivation of the attackers and their techniques. The theoretical part of solving the problems of the thesis is based on the study and analysis of mostly foreign expert information resources. The practical part is based on the specification and implementation of the most famous Honeypot on the Internet and the subsequent analysis of logs. The benefit of the thesis are the results that have been offered and the network security specialists for analysis and automatic recording of threats to records third-party servers.
Monitoring of network attacks with honeypot systems
Krula, Jiří ; Vasilenko, Alexandr (advisor) ; Rostislav , Rostislav (referee)
This thesis focuses on the topic of honeypots technology and their use for network attacks monitoring. It theoretically analyzes the honeypots and their variants honeynet and honeytoken. The practical part describes how to deploy two open source solutions of honeypot, Kippo and Dionaea. Kippo honeypot can be classified, despite its limitations, as a high interactive honeypot. This solution emulates the SSH service and it is primarily intended for the detection and capture of brute force attacks on the service. Dionaea is a honeypot designed primarily for capturing malware. It aims to capture malware in the trap using the vulnerabilities of offered and exposed network services with the aim to obtain a copy of the malware for subsequent analysis. Data obtained from the real deployment of the proposed solutions are presented and measures in relation to the SIEM instruments are proposed as well as improved security of the protected network.
Web security
Zídka, Michal ; Pícka, Marek (advisor) ; Martínek, Tomáš (referee)
Bachelor thesis introduces the basic terms related to work on the website. Describes the various threats. Defines the term hacker and describes three techniques of a server attack-denial of access and attacks phishing, pharming and MITM. It shows a view on the security of the client (user) and technologies that are used to protect the server. There is also a part with an example of phishing attacks, which are created by the author and simulated on fictional website. Author is testing the phishing attacks on reality-based simulation by himself.
E-safety knowledge and skills of civil service employees
PÓLOVÁ, Marie
The aim of the thesis is to evaluate the issue of esafety related knowledge and habits of people working in civil service. I focused on protection against malware, phishing and data loss. Next, I examined the habits when working with security passwords and habits when working with electronic mail. I approached the issue at hand using a questionnaire aimed to find out whether civil servants are capable of protecting themselves against cyber threats. Selected problem I solved using a questionnaire, which I investigated whether civil servants are able to protect against computer threats. The results were processed using statistical methods chi-square statistic, Student t-test and Simple analysis of variance. I found the factors that influence the behavior and habits of the respondents. It is the strength of the password they use to access the applications with sensitive data and meeting with the malware infection. Here it was found the most addictions confirmed. Of the personality factors most influences the behavior of respondents education and then followed by sex.
Internet Criminality
Kosek, Lukáš ; Paclíková, Vlasta (referee) ; Soukup, Tomáš (advisor)
First part of this bachelor thesis deals with computer criminality in Czech Republic, as well as abroad, and focuses on the copyright infringement. It describes different ways through which criminals obtain original works for further illegal usage. Second part of this work offers possible solutions in relation to the results of my survey.
Use of New Methods for Securing Remote Computers
Šandera, Vladimír ; Řihák, Petr (referee) ; Ondrák, Viktor (advisor)
This paper is focused on computer security services for households and small businesses. First I analyze the current situation on the computer security market. In theoretical part of the paper I will describe known types of security threats as viruses, malware, rootkits and counter measures against these threats. In practical part of the paper I analyze current conditions on the market, my business project and I introduce new concept for securing remote computers. I will talk about economical advantages of this concept as cost reduction, centralization of resources and increase in efficiency.
Proposal of Computer Network Security in a Small Software Company
Špičák, Jan ; Kastner, Miloš (referee) ; Ondrák, Viktor (advisor)
The bachelor thesis is concerned with the analysis of the current conditions of computer network security and its optimalization in a small software company. The thesis presents solutions how to improve the security of the computer network. The solutions are supposed to prevent the computer network from the Internet attacks and thus avoid losing important data and information.
Internet Criminality
Zelinka, Petr ; Konečný,, Zdeněk (referee) ; Soukup, Tomáš (advisor)
This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of this criminality, used methods and technological equipment. In the second part of diploma thesis there are suggested possible technical and legislative precautions against internet crime.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.

National Repository of Grey Literature : 169 records found   beginprevious124 - 133nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.