National Repository of Grey Literature 27 records found  beginprevious18 - 27  jump to record: Search took 0.01 seconds. 
Hacking, Cracking and Exploiting Websites
Havel, Hynek ; Benda, Petr (advisor)
The work summarizes the most common attacks on Web sites and web applications. The aim is to elaborate and try out attacks in their dangerousness. Work should serve as an introduction to the potential risks and solutions.
Analysis of security and authentication of wireless networks
Kulíř, Tomáš ; Jeřábek, Jan (referee) ; Szőcs, Juraj (advisor)
This master's thesis deals with wireless networks, mainly about the WiFi. It deals with summary of individual security mechanism both theoretically and using them in real hardware. Mainly it is interested in the security of the individual mechanisms and their weaknesses, which cause rupture of security. At each chapter the ideas and methods, that the attackers are trying for infiltration of wireless networks and decrypt encryption WEP, WPA or WPA2, are outlined. The principle of the authentication of the WiFi by the authentication server and its options, which is connected with directory service LDAP, is also explained in this thesis. The penultimate chapter deals with the summary of security mechanisms and references that should be adhered by design of the WiFi for the provision of the high security. The ending of the master's thesis is devoted to social engineering and its most famous representatives.
Application for monitoring and controlling the security of large LAN and WAN computer networks
Maloušek, Zdeněk ; Polívka, Michal (referee) ; Novotný, Vít (advisor)
Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is often stored only in electronic devices and that is why the security of the data is so important. The objective of my thesis is to describe network security problems and their solutions. First chapter deals with the network security, security checks and attacks. It describes procedures used in practise. First part deals with traffic scanning and filtering at various layers of the TCP/IP model. Second part presents the types of proxy and its pros and cons. Network Address Translation (NAT) is a favourite technique of managing IP addresses of inside and outside network which helps to improve the security and lower the costs paid for IP addresses. NAT description, IPSec, VPN and basic attacks are described in this section. The second chapter of the thesis presents set of Perl scripts for network security checking. The purpose of the project is not to check the whole network security. It is designed for contemporary needs of IBM Global Services Delivery Centrum Brno. The first script checks running applications on target object. The aim is to detect services that are not necessary to run or that are not updated. The second one checks the security of the Cisco device configuration. There is a list of rules that has to be kept. The third script inspects the Nokia firewall configuration which is on the border of IBM network. If some of the rule is broken, it shows the command that has to be proceeded at the particular device. The output of the first and the second script is an HTML file. The third script uses the command line for the final report. The last part of this chapter gives advice to configure Cisco devices. It is a list of security recommendations that can be used by configuring e.g. routers. The appendix presents two laboratory exercises. The aim is to give students an opportunity to learn something about programs and technologies which are used in practise by IT experts to check the weaknesses of their networks.
Security of mobile devices running Android
Novotný, Josef ; Pecinovský, Rudolf (advisor) ; Pavlíček, Luboš (referee)
The main subject of this thesis is the security of Android platform mobile devices. The goal of the thesis is to design and develop an application that will check given devices from the security point of view and to check the security of applications developed as the subject of theses created in the last few years at the University of Economics. In the first part of thesis there is an analysis of ways to secure the Android platform devices and applications and ways to attack them. Both the offline and the client/server architecture applications are also taken into consideration. The next part includes a security analysis of the selected application based on the beforehand determined criteria. An analysis and development of the application designated to examine the security of the given device is next. The outcome of the thesis is an easy to use application that can be launched on the mobile devices running Android 2.2 Froyo and higher.
Market analysis of security software
Doležal, Ladislav ; Benáčanová, Helena (advisor) ; Řezníček, Dušan (referee)
In this thesis, I analyze the global supply of security software (for operating system Win-dows) with a focus on anti-virus programs, which currently mostly implicitly include vari-ous modules of security software. In the first part of my thesis, I will focus on the clarification of issues related to IS / IT se-curity and cybercrime. I describe here the security IS / IT in general, describes the basic concepts and information safety, so that readers gain a basic understanding of this issue. I explain the concept of cybercrime and characterize its main crime. The second part will focus on the clarification of issues relating to security and safety not only domestic, but also corporate computers. I further characterize the greatest threats of our time for PC users and the possibility of prevention. In the third part, I will analyze the security software market analysis due to their market shares and qualifying tests conducted by recognized independent organizations, so to currently provide their full offer. Using the survey I will find out what is the awareness on the selection and use of antivirus software, and on this basis determine what antivirus software are most popular by users.
Cyber crime in the Slovak republic
Kalinová, Diana ; Sigmund, Tomáš (advisor) ; Toman, Prokop (referee)
The Bachelor thesis focuses on cyber crime in the Slovak republic, as a new kind of criminality that is associated with computers and modern technologies as well as a problem, which must be addressed. It explains the concept of cyber crime, its divisions and problems that are associated whit it. It seeks to bring selected types of crime, how they work in practice and used instruments. It briefly reflects the history of computer crime. The next part of the Bachelor mentions in chronological order the most serious cases, which occurred in the history of Slovak cyber crime. It appoints and describes the institutions, laws and prevention programs, which dealing with this issue in Slovakia. The main part of Bachelor thesis is the search for foreign legislative changes, which should be positive and negative examples for Slovakia. On the basis of all obtained information listed in the thesis, assess the situation in the Slovak republic and propose possible solution.
History of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007.
SUFČÁK, Pavel
The subject of this bachelor?s work is a history of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007. The goal of this bachelor?s work is performance of analysis of the development of personal data protection in the time period from the year 1990 until the year 2007 with special emphasis on everyday work and practise of police organisms and police bodies within Management of the South Bohemia Region, POLICE of the CZECH REPUBLIC. Next successive goal of this bachelor?s work is the performance of analysis of the development of computer technology applied and used in police practice (safeguarding, protection, operation, back-up and archiving, anti-virus protection, case reporting). Theoretical part of this bachelor?s work deals with and analyses the concept of privacy, the development of the right of privacy, the development of the right to protection of personal data in terms of global, European, the Czech Republic, public-law, criminal-law and police. This bachelor?s points out the possibility of various types of imminent danger in the area of data funds being exposed to danger while using the most important relevant methods of cybernetics and cybernality. The integral part of this bachelor?s work is performance of quantitative analysis of the development of occurrence and incidence of criminal acts according to § 178 Unlawful/wrongful treatment of personal data, §§ 239, 240 Breach of secrecy of delivered messages, § 257a Damage and misuse/ill-use of a record on information carrier, arising out of the ESSK (Monitoring, Evidence Statistical System of Criminality) information system, which is run by the Centre (Headquarter Centre) of Informatics and Analytical Processes of the Service of Criminal Investigation Police Headquarters of the Czech Republic in the time period from the year 1990 until the year 2007. The second analysis assesses and evaluates the level of activities of appointed/ authorized policemen, who on the basis of the Act On Police of the Czech Republic perform direct supervision and inspection regarding observance of legislative standards of both having their basis in laws and falling and being obligatory within the Ministry of Interior under the conditions of Police Force in the Czech Republic, including pointing out the most frequent slight mistakes.
Human factor in IS/IT security and social engineering
Trčka, Adam ; Doucek, Petr (advisor) ; Bébr, Richard (referee) ; Nováček, Jan (referee)
Řešení bezpečnosti informačního systému v návaznosti na lidský faktor je spolu se stále více se rozvíjejícím nebezpečím sociotechniky velkou otázkou a výzvou k řešení. Cílem této práce je utvořit obecný přehled a klasifikaci informací a možného selhání lidského faktoru při projektování a provozu informačního systému. Dle autora jedním z nejdůležitějších kroků při plánování bezpečnosti je prevence a seznámení se svým nepřítelem. Proto je část práce věnována právě představení hrozeb spolu s jejich typickými projevy.
Computer criminality
Vyhnálek, Aleš ; Pokorný, Pavel (advisor) ; Svoboda, Lukáš (referee)
Diploma thesis characterises the most important kinds of computer crime, economically evaluates incurred harms, presents factual examples and a prognosis of the possible way of developement of this kind of crime in the future. Thesis includes legislation regarding the computer crime and possible ways of defending against it. In the end, in the form of a questionary, the thesis monitors the knowledge of students of the Faculty of management in Jindřichův Hradec about the field of computer crime and interprets these results using graphs.
Člověk jako klíčový prvek bezpečnosti IS
Grznár, Tomáš ; Doucek, Petr (advisor) ; Novák, Luděk (referee)
Práce se zabývá pozicí lidí v bezpečnosti informačních systémů. První část se zaměřuje na běžné uživatele a přináší rozbor toho, jaké nejčastější nebezpečí jim hrozí. Velká část je věnována představení nejčastějších typů hackerských útoků jako phishingu, sociotechnice a nebo malwaru. Čtenáři jsou pak prezentovány možné opatření, které je možné udělat, aby se dopady hackerských útoků snížily. Druhá část práce pak přináší manažerský pohled na bezpečnost lidských zdrojů. V práci jsou ukázány styčné plochy a možnosti řízení této oblasti z pohledu ITIL Security Managementu, ČSN ISO/IEC 13335 a ČSN ISO/IEC 27001. Výsledkem je pak souhrn doporučení, které může management společnosti v oblasti bezpečnosti lidských zdrojů přijmout. Opatření jsou koncipována tak, aby je bylo možné přijmout bez ohledu na to, jaká norma a nebo standard se používá k řízení bezpečnosti v podniku.

National Repository of Grey Literature : 27 records found   beginprevious18 - 27  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.