National Repository of Grey Literature 25 records found  beginprevious15 - 24next  jump to record: Search took 0.01 seconds. 
Potential risks of electronic communication among secondary school teenagers
KOLEŠ, Jiří
The bachelor thesis focuses on modern electronic communication and its use by high school youth. It is aimed primarily at the possible risks connected with the use of electronic communication. The main goal of the thesis is to point out the sociopathological occurences connected with the IT communication. The theoretical part of the thesis is mainly concerned with the sociopathological occurences connected with the usage of IT communication, such as cyberbullying, stalking, sexting, cyber grooming, social engineering and manipulative communication. The practical section of the thesis explores the frequency of the use of electronic communication by high school youth, the extent in which they are acquianted with sociopathological occurences connected with electronic communication, and whether the students themselves have personally experienced cyberbullying.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
Analysis of the current state of cybercrime in the EU
Veselý, Dominik ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU focuses in its theoretical part on the definition of the term cybercrime. This term is very comprehensive, therefore the vast majority of the paper consists of the variety of forms of cybercrime. There are talking specificaly about attacks againts personal computers and software systems, attacks, that lead up to misuse of computers, datas and other information, breaking the copyright and last, but not least using the computers againts the law. An integral part of the thesis is the current legislation, investigation of a cyber offense and the defense againts cybercrime. And interesting chapter are the trends from the years 2010 to 2016, where I mention the most interesting real-life cases of cybercrime. The main aim of the practical part of the thesis is unification of recommendations and rules concerning the defense againts cybercrime based on my obtained information and experience.
Phishing and suitable protection against it
Trepáčová, Veronika ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis covers the issue of phishing and suitable protection against it. In the theoretical part are firstly explained the basic characteristics, development, types and techniques of phishing and also the concept of social engineering. Phishing emails are further divided into categories and according to their major features is possible to observe the differences of each individual group of e-mails and their increasing perfection. The last theoretical chapter focuses on the Internet banking in the Czech Republic. The aim of this section is to point out the ability and the means of informing banks' clients about security and potential dangers when working with Internet banking. The banks with the largest number of clients were selected and were evaluated through analysis of security webportals based on the specified criteria. The main objective, which is met by the practical part of the thesis, is to create a handbook for a user of the Internet and Internet banking. User can find in this handbook necessary advice, recommendations and procedures to be followed when receiving a suspicious email and identifying potential threat.
Defense against social engineering attacks
Škopec, Antonín ; Sigmund, Tomáš (advisor) ; Šimek, Luděk (referee)
This theses concerns with social engineering and defense against it. Social engineering attacks represents significant threat for organizations and their information systems, especially because they target weakest link in information systems security, its users. That way attacker can easily bypass even highly sophisticated security system. This theses tries to deal with question, how to effectively secure human factor of information system.
Psychological principles in techniques of social engineering
Pohorelec, Pavel ; Sigmund, Tomáš (advisor) ; Kašparová, Eva (referee)
Social engineering is type of attack, usable against an organization or individual. It focuses on weaknesses of human factor. In recent times, characterized by anonymity, fast pace and focus on technologies presents this way of attack a dangerous threat. Human factor tends to be underestimated in defense, into which organizations invest large amounts of money. Even though social engineering has been written about many times, most of work has been focused more on technical part, and explaining techniques of social engineering has been left out. The goal of this paper is explaining these techniques from psychological point of view, and using that as a basis for defense for organizations, threaten by social engineering attack. In first part, this work describes two main themes -- social engineering and social psychology. Afterwards, it describes principles, which are used in social engineering attack, and ways in which social engineering uses them. In second part are these information used to analyze several practical examples of social engineering attack. Then, they are used to formulate practical advices to defend against social engineering attack.
Security and protection of the data on Faculty of Management VSE
Deml, Michal ; Pokorný, Pavel (advisor) ; Štrobl, David (referee)
The bachelor thesis describes the possible threats that may jeopardise the data of the common user. It describes the threats in the form of the unwanted software, targeted attack or as result of natural disaster. At the same time it describes how user may protect his data against lost and these above mentioned threats. In other chapters the thesis concerns about the riskiness of the behavior of the user and way of software and hardware protection of data on the Faculty of Management of VŠE. Based on information obtained by these tests the thesis defines the main security gaps in system of the Faculty of Management.
History of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007.
SUFČÁK, Pavel
The subject of this bachelor?s work is a history of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007. The goal of this bachelor?s work is performance of analysis of the development of personal data protection in the time period from the year 1990 until the year 2007 with special emphasis on everyday work and practise of police organisms and police bodies within Management of the South Bohemia Region, POLICE of the CZECH REPUBLIC. Next successive goal of this bachelor?s work is the performance of analysis of the development of computer technology applied and used in police practice (safeguarding, protection, operation, back-up and archiving, anti-virus protection, case reporting). Theoretical part of this bachelor?s work deals with and analyses the concept of privacy, the development of the right of privacy, the development of the right to protection of personal data in terms of global, European, the Czech Republic, public-law, criminal-law and police. This bachelor?s points out the possibility of various types of imminent danger in the area of data funds being exposed to danger while using the most important relevant methods of cybernetics and cybernality. The integral part of this bachelor?s work is performance of quantitative analysis of the development of occurrence and incidence of criminal acts according to § 178 Unlawful/wrongful treatment of personal data, §§ 239, 240 Breach of secrecy of delivered messages, § 257a Damage and misuse/ill-use of a record on information carrier, arising out of the ESSK (Monitoring, Evidence Statistical System of Criminality) information system, which is run by the Centre (Headquarter Centre) of Informatics and Analytical Processes of the Service of Criminal Investigation Police Headquarters of the Czech Republic in the time period from the year 1990 until the year 2007. The second analysis assesses and evaluates the level of activities of appointed/ authorized policemen, who on the basis of the Act On Police of the Czech Republic perform direct supervision and inspection regarding observance of legislative standards of both having their basis in laws and falling and being obligatory within the Ministry of Interior under the conditions of Police Force in the Czech Republic, including pointing out the most frequent slight mistakes.
Internet attacks in term of end-user
Šírek, Martin ; Gála, Libor (advisor) ; Hlaváč, Jindřich (referee)
Personal computer connected to the Internet is a phenomenon of our time. Hand in hand with the positive development of the possibilities offered by the Internet is an effort to abuse them. Computer attacks are the crudest way of such abuse. This work explains the nature of cyber attacks and structure of the attacks. The aim is to explain how cyber attackers threat end-users of the computer and what defence exists against it. It's an introduction to the problem. The work is based around the assumption that the reader is a beginner in the field of information technology and the depth and scope of interpretation are adapted to it. For deeper study it refers to the sources in the rich list of used literature. The introductory section describes the structure of attacks and the interrelations between threats, assets (endangered goods) and vulnerability. Considerable space is devoted to the usage of social engineering for cyber attacks. Thereinafter methods,software and objectives of the attackers are explained. Measures against attacks are not missing too. The final section explains connections between the attacker's tools.

National Repository of Grey Literature : 25 records found   beginprevious15 - 24next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.