National Repository of Grey Literature 169 records found  beginprevious154 - 163next  jump to record: Search took 0.00 seconds. 
Analysis of the current state of cybercrime in the EU
Veselý, Dominik ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU focuses in its theoretical part on the definition of the term cybercrime. This term is very comprehensive, therefore the vast majority of the paper consists of the variety of forms of cybercrime. There are talking specificaly about attacks againts personal computers and software systems, attacks, that lead up to misuse of computers, datas and other information, breaking the copyright and last, but not least using the computers againts the law. An integral part of the thesis is the current legislation, investigation of a cyber offense and the defense againts cybercrime. And interesting chapter are the trends from the years 2010 to 2016, where I mention the most interesting real-life cases of cybercrime. The main aim of the practical part of the thesis is unification of recommendations and rules concerning the defense againts cybercrime based on my obtained information and experience.
Malware Analysis: Tools and Techniques
Danilov, Marcel ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis adresses present day topic of broad interest, the topic of malware. This term stands for malicous software as viruses, worms, trojans, spyware etc. Simply put a software with intent to do harm to the users of computers or mobile devices, to their steal information or gain access to their private computer systems. This thesis is divided into several chapters. First few of them are theoretical. First one describes malware in general. It defines what malware is and divides it into categories. Second chapter introduces a discipline of malware analysis. A discipline where malware, its components and behaviour is analysed in laboratory environment. This chapter contains general description of malware analysis, categories in which is this analysis divided, and rules of said analysis. Third chapter goes even further into malware analysis. It describes and identifies its indiviual techniques and tools. Last chapter is focused on practical usage of malware analysis. Theoretical knowledge of malware analysis, specifically knowledge of tools and techniques described in previous chapters is demonstrated on real, live example of malware. Thanks to demonstration of tools and techniques; funcionality, structure and life cycle of mentioned piece of malware is also being analyzed. Goal of this thesis is to bring reader closer to the topic of malware, with emphasis on area of malware analysis. This contains an explanation what an malware analysis is, what is its purpose. Next goal is to develop a summary of malware analysis basic tools and techniques. Thesis contribution is application of knowledge of techniques and tools on real malware analysis. With the help of malware analysis, this thesis demonstrates its individual tools and techniques on live example of malware. Other contributions are deriving from analysis itself. Funcionality, structure and life cycle of analysed piece of malware is also being explained.
Market analysis of security software
Doležal, Ladislav ; Benáčanová, Helena (advisor) ; Řezníček, Dušan (referee)
In this thesis, I analyze the global supply of security software (for operating system Win-dows) with a focus on anti-virus programs, which currently mostly implicitly include vari-ous modules of security software. In the first part of my thesis, I will focus on the clarification of issues related to IS / IT se-curity and cybercrime. I describe here the security IS / IT in general, describes the basic concepts and information safety, so that readers gain a basic understanding of this issue. I explain the concept of cybercrime and characterize its main crime. The second part will focus on the clarification of issues relating to security and safety not only domestic, but also corporate computers. I further characterize the greatest threats of our time for PC users and the possibility of prevention. In the third part, I will analyze the security software market analysis due to their market shares and qualifying tests conducted by recognized independent organizations, so to currently provide their full offer. Using the survey I will find out what is the awareness on the selection and use of antivirus software, and on this basis determine what antivirus software are most popular by users.
iOS platform security
Nidl, Michal ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter describes the system interferences and methods for their detection. The sixth chapter deals with comparison of iOS security and Android and Windows Phone platform security. In this chapter is introduced the security of competitive platforms in terms of security model, system security, application security and interferences. This comparison includes the table with evaluation of security. Objective of this thesis is to introduce ways of security in one of the most widely used mobile platform. Moreover the aim is to compare iOS security with security of two competitive platforms. The result is an analysis of iOS security and it's comparison with Android and Windows Phone security.
The Problematics of Phishing
Kemr, Jakub ; Klíma, Tomáš (advisor) ; Pavlíček, Luboš (referee)
Bachelor thesis focuses on still current and specific type of cybercrime called phishing. The goal of the thesis is to introduce an ordinary internet user to the phishing issue by describing the functionality of different techniques of attack and appropriate ways of prevention and defence against these types of cyber-attacks. The thesis is divided into three parts. Theoretical part deals with the introduction to the phishing issue and historical development of this fraudulent technology since the early 90s of the 20th century. Furthermore, the theoretical part describes the functionality of different types of phishing techniques from the most famous to the less well-known. The end of the theoretical part describes the prevention and defence possibilities at user, software and organizational level. The second part of the work focuses on the analysis of phishing attacks. First the thesis analyses some of the recent attacks on Czech clients, in particular their structure, progress and the real purpose. The following parts show the preparation and process of one classic and one modern attack with examples of detection and possibilities of appropriate defence against these specific techniques. Final part of the thesis shows the results of the survey and phishing quiz, focused on ordinary internet users and their awareness of this issue.
The relationship between malware attacks and the popularity of operating systems
Jirmusová, Radka ; Gála, Libor (advisor) ; Čermák, Igor (referee)
The Bachelor thesis deals with the issue of malware and operating systems. The scope of the work is to prove or disprove the relationship or dependence between the number of malware attacks and different operating systems using statistical calculations. The goal of this thesis is achieved on the basis of methodology of analysis. The thesis presents the result of the analysis used to summarize the conclusions. The work is divided into four main parts. The first part introduces the issue of malware to the reader. The second section intoduces operating systems used in the analysis. The third part defines the relationship between the malware and information technology. The final section deals with statistical calculations and achieved results. Own contribution of the thesis is to evaluate the dependencies in the monitored areas.
Malware - threats and countermeasures
Hejduk, Jakub ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor's thesis addresses the issue of a threat in the area of computers and internet networks, malware. It defines what malware is, its various types and the history in terms of occurrence and actions. It also provides the reader with insight into malware's functionality and how it threatens users. Furthermore, the thesis contains examples of some current well-known threats. A dossier on antivirus and antispyware software is also included. It is essentially a summary of their functions, properties, benchmark results and a list of countermeasures it equips the user with. The last section of the theoretical part of the thesis is a prediction of the future regarding the evolution of these threats and how will they affect the user. A considerable part of this work is a survey providing a summary of the current level of malware knowledge among people. I intend to determine if people are aware of these threats, their ability to defend themselves against them and also whether they already encountered this issue and if so, how did they handle it. This thesis should increase awareness about malware to make people understand what it is capable of in the environment of an unsecured computer. Ultimately, I am going to present the results of the survey and evaluate the depths of knowledge about malware among people.
Malware analysis and reverse engineering
Šváb, Martin ; Čermák, Igor (advisor) ; Hlaváč, Jindřich (referee)
Focus of this thesis is reverse engineering in information technology closely linked with the malware analysis. It explains fundamentals of IA-32 processors architecture and basics of operating system Microsoft Windows. Main part of this thesis is dedicated to the malware analysis, including description of creating a tool for simplification of static part of the analysis. In Conclusion various approaches to the malware analysis, which were described in previous part of the thesis, are practically demonstrated on unknown malware sample.
Virtual environment for behavioral analysis of malware
KOVÁŘ, Jaroslav
The goal of this bachelor thesis was to propose and implement a virtual environment for behavioral analysis of malware. Specifically with simulated network services. Subsequently was this environment applied to the analysis of several selected malware samples.
The analysis of discussion forums helping users with infected computer
Labant, Patrik ; Pavlíček, Luboš (advisor) ; Bruckner, Tomáš (referee)
This work is focused on discussion forums, when they are viewed as a means (one of the methods) for malware removing from computers. In the theoretical section, the assumptions and actions that precede to the successful removal of malware from a computer are firstly described. It is based on adequate knowledge of users about computers, when there is a list of options, mentioned in the text, where users can acquire this knowledge. Next, this section describes the symptoms of strange computer behavior that may be caused by malware. It is followed by characteristics of selected types of malware and list of options where users can solve their problems with infected computer. At the end of theoretical part is a list of preventive measures to prevent infection of computer by malware. The practical part is mainly devoted to the analysis of discussion forums, where the common characteristics of the majority forums are firstly described, and subsequently three forums are selected and analyzed in detail, based on the list of common characteristics with a focus on mentors (moderators) on this forums, their activities and qualifications, and focused on the procedures for dealing with malware infected computer.

National Repository of Grey Literature : 169 records found   beginprevious154 - 163next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.