National Repository of Grey Literature 28 records found  beginprevious21 - 28  jump to record: Search took 0.01 seconds. 
The Complexity of Security Threats in Urban Areas: The Case of Johannesburg.
Sanjoh, Charles ; Střítecký, Vít (advisor) ; Svitková, Katarína (referee)
Cities today have become a playground for man-made security threats. From terrorism, drug abuse, and different forms of physical violence that impedes the smooth functioning of the activities of those living within the city spaces. Considering the present day violence and insecurity in our cities, it is vital not only to embark on preventive measures, but also to learn how to cope with and adapt to them. Since it would be an illusion to think of eliminating violence, resilience becomes an important aspect, a gateway to move on with our daily activities without fear and with greater hope for a better future. It is in this respect that I decided in this thesis to talk about resilience within our municipalities with a special focus on the city of Johannesburg in South Africa.
Czech Public on Its Fears and on Security Threats for the Czech Republic - December 2016
Červenka, Jan
In December 2016, respondents had to assess security threats related to selected groups in the Czech Republic and they were also expressing views on threats by war, epidemics, natural disasters, economic crisis or resource crisis. These two questions were amended with an open question trying to find out, what are their current fears.
Network Protection Using NetFlow Data
Sedlář, Petr ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a summary of common security risks in term of their detection on network and transport layer. There are specified characteristics of NetFlow data containing samples of security risks. On the basis of these characteristics, an application for detection these risks is designed and implemented.
Network Protection Using NetFlow Data
Hlavatý, Ivo ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.
Computer Identification Based on Its Network Behaviour
Myška, Michal ; Halfar, Patrik (referee) ; Polčák, Libor (advisor)
This diploma thesis deals with computer identification using network behavioral patterns. Security functions providing privacy are described together with user privacy threats. Then, several approaches to the computer identification based on network behaviour are described. The proposed tool is based on data mining method Multinomial Naive Bayes. Then, the implementation of proposed tool is described and the experiments recognizing success in the identification are performed.
Security Threats for the Czech Republic in View of Public - December 2015
Tuček, Milan
In December 2015, respondents had to assess security threats related to selected groups in the Czech Republic and they were also expressing views on threats by war, epidemics, natural disasters, economic crisis or resource crisis. These two questions were amended with an open question trying to find out, which countries represent a security threat for the Czech Republic. The survey also focused on expectations concerning the future of the personal life of citizens, the future of the Czech society and the future of the whole humankind.
Security of smartphones on the Android platform
Hradil, Martin ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis focuses on security problems of smartphones, specifically on the Android Platform. The goal of the thesis is to introduce user to the history of the Android mobile operating system, what threats can users face and what are the possibilities of preventing those threats and ways to deal with their consequences. The theoretical first part is devoted to the history of the Android platform since the first public version in year 2008 to the latest version from March 20015. This section describes development of the platform, along with explanations of important innovations and features. The second part is focused on individual threats the Android users may encounter. This section contains an analysis of the various threats and the possible methods of preventing and dealing with the consequences along with recommendations for specific users groups. The third part contains an analysis of selected security application. This part contains a description and analysis of the functions together with recommendations on settings and evaluation of the application. The fourth part contains demonstration of abuse of mobile phone via USB debugging mode. In this example, the reader can learn about the risks of enabled debugging mode. The last fifth section contains description and results of a survey aimed at Android smartphone users.
Security in Oracle database
Lukanič, Michal ; Čermák, Igor (advisor) ; Pour, Jan (referee)
The amount of electronically stored data is constantly growing. That's why we should consider the data security. Most electronic information is stored in the database. This thesis is concerned with ensuring data security in the Oracle database. First of all, I describe some of the available security surveys, to make it clear why we need to ensure the data security. In addition, I also describe the main aspects of information security. The aim is to introduce what we mean by security of information. Then I examine the recommendations of ISO 17799 standard, which is one of the sources for the measures described in the main part of this thesis. The next part is dedicated to finding the important security threats, which are used as a basis for following description of security tools. The aim of described recommendations and threats is to discover what is needed to ensure the data security. In the main part of this thesis I discuss the various security tools and procedures. The main objective of this thesis is the description of tools and procedures to ensure data security, following the recommendations of international standards and typical security threats. All described tools are part of the Oracle database. I place emphasis on the user access control.

National Repository of Grey Literature : 28 records found   beginprevious21 - 28  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.