National Repository of Grey Literature 169 records found  beginprevious150 - 159next  jump to record: Search took 0.00 seconds. 
Network Attack Capture Using Honeypots
Mlčoch, Tomáš ; Chmelař, Petr (referee) ; Richter, Jan (advisor)
This bachelor thesis deals with honeypot tools and adapting a Linux operating system into such tool. The thesis presents general categories of malicious codes and current trends in this area. The thesis also presents an existing honeypot tool Honeyd and its features. Next there are introduced tools and techniques to monitor a Linux system, compared the selected virtualization technology and explained the process of creating a virtual Linux honeypot.
Analysis of Security Incidents from Network Traffic
Serečun, Viliam ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
Analýza bezpečnostních incidentů se stala velmi důležitým a zajímavým oborem počítačové vědy. Monitorovací nástroje a techniky pomáhají při detekci a prevenci proti tímto škodlivým aktivitám. Tento dokument opisuje počítačové útoky a jejich klasifikaci. Také jsou tady opsaný některé monitorovací nástroje jako Intrusion Detection System nebo NetFlow protokol a jeho monitorovací software. Tento dokument také opisuje konfiguraci experimentální topologie a prezentuje několik experimentů škodlivých aktivit, které byly detailně kontrolovány těmito monitorovacími nástroji.
Metrics for Buffer Overflow Attacks Detection of UDP Network Services
Šulák, Ladislav ; Ovšonka, Daniel (referee) ; Homoliak, Ivan (advisor)
This bachelor thesis deals with problematic of network attacks and their detection in network traffic. The aim is to propose such collection of metric, that will describe network traffic according to its behaviour, and will be capable of detection of Zero-Day attacks as well. Following part of this thesis is to implement a tool for metric extraction.
Malware, internet threat - types and protection
Vaňková, Aneta ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals the world malware and what this word means. The theoretical part describes the particular division of malware, its history and development from the 70s to the present. Other chapters include targets of hackers, why malware exists and what is the motivation of its authors. Conclusion of the theoretical part describes other threats which are on the Internet. The practical part includes two explorations. The first is dedicated to antivirus, it represents the most frequently used programs, their functionality and user interface. Test of infected file demonstrates the functionality and level of security. Final summary assists users in selecting the appropriate antivirus for their computer. The second is realized as a questionnaire which determines the awareness of the general public about the danger of malware and defence against it. The conclusion evaluate results of explorations of the practical part, it compares targets of this bachelor thesis and monitors their achievement or provides information about extension of explorations.
Analysis of the current state of cybercrime in the EU
Veselý, Dominik ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU focuses in its theoretical part on the definition of the term cybercrime. This term is very comprehensive, therefore the vast majority of the paper consists of the variety of forms of cybercrime. There are talking specificaly about attacks againts personal computers and software systems, attacks, that lead up to misuse of computers, datas and other information, breaking the copyright and last, but not least using the computers againts the law. An integral part of the thesis is the current legislation, investigation of a cyber offense and the defense againts cybercrime. And interesting chapter are the trends from the years 2010 to 2016, where I mention the most interesting real-life cases of cybercrime. The main aim of the practical part of the thesis is unification of recommendations and rules concerning the defense againts cybercrime based on my obtained information and experience.
Malware Analysis: Tools and Techniques
Danilov, Marcel ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis adresses present day topic of broad interest, the topic of malware. This term stands for malicous software as viruses, worms, trojans, spyware etc. Simply put a software with intent to do harm to the users of computers or mobile devices, to their steal information or gain access to their private computer systems. This thesis is divided into several chapters. First few of them are theoretical. First one describes malware in general. It defines what malware is and divides it into categories. Second chapter introduces a discipline of malware analysis. A discipline where malware, its components and behaviour is analysed in laboratory environment. This chapter contains general description of malware analysis, categories in which is this analysis divided, and rules of said analysis. Third chapter goes even further into malware analysis. It describes and identifies its indiviual techniques and tools. Last chapter is focused on practical usage of malware analysis. Theoretical knowledge of malware analysis, specifically knowledge of tools and techniques described in previous chapters is demonstrated on real, live example of malware. Thanks to demonstration of tools and techniques; funcionality, structure and life cycle of mentioned piece of malware is also being analyzed. Goal of this thesis is to bring reader closer to the topic of malware, with emphasis on area of malware analysis. This contains an explanation what an malware analysis is, what is its purpose. Next goal is to develop a summary of malware analysis basic tools and techniques. Thesis contribution is application of knowledge of techniques and tools on real malware analysis. With the help of malware analysis, this thesis demonstrates its individual tools and techniques on live example of malware. Other contributions are deriving from analysis itself. Funcionality, structure and life cycle of analysed piece of malware is also being explained.
Market analysis of security software
Doležal, Ladislav ; Benáčanová, Helena (advisor) ; Řezníček, Dušan (referee)
In this thesis, I analyze the global supply of security software (for operating system Win-dows) with a focus on anti-virus programs, which currently mostly implicitly include vari-ous modules of security software. In the first part of my thesis, I will focus on the clarification of issues related to IS / IT se-curity and cybercrime. I describe here the security IS / IT in general, describes the basic concepts and information safety, so that readers gain a basic understanding of this issue. I explain the concept of cybercrime and characterize its main crime. The second part will focus on the clarification of issues relating to security and safety not only domestic, but also corporate computers. I further characterize the greatest threats of our time for PC users and the possibility of prevention. In the third part, I will analyze the security software market analysis due to their market shares and qualifying tests conducted by recognized independent organizations, so to currently provide their full offer. Using the survey I will find out what is the awareness on the selection and use of antivirus software, and on this basis determine what antivirus software are most popular by users.
iOS platform security
Nidl, Michal ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter describes the system interferences and methods for their detection. The sixth chapter deals with comparison of iOS security and Android and Windows Phone platform security. In this chapter is introduced the security of competitive platforms in terms of security model, system security, application security and interferences. This comparison includes the table with evaluation of security. Objective of this thesis is to introduce ways of security in one of the most widely used mobile platform. Moreover the aim is to compare iOS security with security of two competitive platforms. The result is an analysis of iOS security and it's comparison with Android and Windows Phone security.
The Problematics of Phishing
Kemr, Jakub ; Klíma, Tomáš (advisor) ; Pavlíček, Luboš (referee)
Bachelor thesis focuses on still current and specific type of cybercrime called phishing. The goal of the thesis is to introduce an ordinary internet user to the phishing issue by describing the functionality of different techniques of attack and appropriate ways of prevention and defence against these types of cyber-attacks. The thesis is divided into three parts. Theoretical part deals with the introduction to the phishing issue and historical development of this fraudulent technology since the early 90s of the 20th century. Furthermore, the theoretical part describes the functionality of different types of phishing techniques from the most famous to the less well-known. The end of the theoretical part describes the prevention and defence possibilities at user, software and organizational level. The second part of the work focuses on the analysis of phishing attacks. First the thesis analyses some of the recent attacks on Czech clients, in particular their structure, progress and the real purpose. The following parts show the preparation and process of one classic and one modern attack with examples of detection and possibilities of appropriate defence against these specific techniques. Final part of the thesis shows the results of the survey and phishing quiz, focused on ordinary internet users and their awareness of this issue.
The relationship between malware attacks and the popularity of operating systems
Jirmusová, Radka ; Gála, Libor (advisor) ; Čermák, Igor (referee)
The Bachelor thesis deals with the issue of malware and operating systems. The scope of the work is to prove or disprove the relationship or dependence between the number of malware attacks and different operating systems using statistical calculations. The goal of this thesis is achieved on the basis of methodology of analysis. The thesis presents the result of the analysis used to summarize the conclusions. The work is divided into four main parts. The first part introduces the issue of malware to the reader. The second section intoduces operating systems used in the analysis. The third part defines the relationship between the malware and information technology. The final section deals with statistical calculations and achieved results. Own contribution of the thesis is to evaluate the dependencies in the monitored areas.

National Repository of Grey Literature : 169 records found   beginprevious150 - 159next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.