National Repository of Grey Literature 77 records found  beginprevious21 - 30nextend  jump to record: Search took 0.00 seconds. 
Design of methodology for vulnerability assesment
Pecl, David ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design of the own method, which aims to assess vulnerabilities that it is easier to identify those with high priority. The method is based on three groups of parameters. The first group describes the technical assessment of the vulnerability, the second is based on the requirements to ensure the confidentiality, integrity and availability of the asset and the third group of parameters evaluates the implemented security measures. All three groups of parameters are important for prioritization. Parameters describing the vulnerability are divided into permanent and up-to-date, where the most important up-to-date parameter are Threat Intelligence and easy of exploitation. The parameters of the impact on confidentiality, integrity and availability are linked to the priority of the asset, and to the evaluation of security measures, which increase the protection of confidentiality, integrity and availability. The priority of the asset and the quality of the countermeasures are assessed based on questionnaires, which are submitted to the owners of the examined assets as part of the vulnerability assessment. In the third part of the thesis, the method is compared with the currently widely used the Common Vulnerability Scoring System. The strengths of the proposed method are shown in several examples. The effectiveness of prioritization is based primarily on the priority of the asset and the security measures in place. The method was practically tested in a laboratory environment, where vulnerabilities were made on several different assets. These vulnerabilities were assessed using the proposed method, the priority of the asset and the quality of the measures were considered, and everything was included in the priority of vulnerability. This testing confirmed that the method more effectively prioritizes vulnerabilities that are easily exploitable, recently exploited by an attacker, and found on assets with minimal protection and higher priority.
Laboratory exercise that presents network attacks
Dostál, Adam ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This work is focused on penetration testing of web applications. The theoretical part describes this issue and methodology. The work includes security organization "The Open Web Application Security Project" (OWASP), document OWASP Top 10 and the first 5 vulnerabilities of this document. The last part introduces linux distribution Kali Linux and the several most used penetration tools. The practical part consists of testing the first five vulnerabilities in the document OWASP Top 10 2013. It contains a description of the used SW for the realization of the attacks, virtual infrastructure and test of each vulnerabilities. From the practical part is created laboratory task "Penetration testing of web applications" and additional introductory task "Introduction into penetration testing".
Design of a smart meter testing methodology focusing on invasive testing
Biolek, Martin ; Sikora, Marek (referee) ; Lieskovan, Tomáš (advisor)
Bachelor thesis is focused on investigating the security deficits of smart meters through penetration testing. The theoretical part describes the standards that should be followed by smart meter manufacturers. This is followed by the practical part where the testing of two smart meter systems was conducted in order to discover their vulnerabilities. The result of the work is the exposure of one of the two systems of interest that requires significant security improvements before deployment of another version. A description of the vulnerabilities is included in the practical part of the thesis.
GUI Tool for Vulnerability Measurement Based on OpenSCAP Library
Oberreiter, Vladimír ; Michlovský, Zbyněk (referee) ; Barabas, Maroš (advisor)
This work describes the SCAP standards (Security Content Automation Protocol) determining the level of computer security and the OpenSCAP library providing a framework to the SCAP standards. It also describes the way of designing and creating security tool using the OpenSCAP library. This tool enables to search for known, potential system vulnerabilities and check the system configuration according to previously set criteria.
The Information Security Management in Company
Kalabis, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This master thesis is focused on the design of implementation the information security management system in the company according to standards ISO/IEC 27000. First of all, it was described the theory of information security management system and it was explained the relevant terms and other requirements in the context of this issue. This assignment involves analysis of the current situation of the company and suggestions that lead to reducing discovered risks and bring improvement of the general information security.
Detection of Blueborne Revealed Vulnerability
Janček, Matej ; Malinka, Kamil (referee) ; Hujňák, Ondřej (advisor)
Táto práca sa zaoberá tvorbou automatickej metódy na detekciu Blueborne zraniteľností v Android zariadeniach. V riešení bola použitá metóda, ktorej základné fungovanie je z vyvolania pretečenia pamäti na zariadení. Následne výsledný nástroj vyhodnotí či sa to podarilo a, či zariadenie je zraniteľné. Nástroj bol testovaný na viacerých zariadeniach, ktoré majú rôzne verzie systému. Testovanie tejto metódy detekcie potvrdilo funkčnosť nástroja.
A Tool for Easily Securing Computers with Linux
Barabas, Maroš ; Hanáček, Petr (referee) ; Vojnar, Tomáš (advisor)
The purpose of this thesis is to explain new approaches to scanning and locking vulnerabilities in computer security and to design a new system to improve security of computers running the Linux operating system. The purpose of this system is to analyze remote operating systems and detect and lock down vulnerabilities by existing security standards.
Development of a calculator for assessing vulnerabilities in Javascript
Škrhák, Pavel ; Fujdiak, Radek (referee) ; Holasová, Eva (advisor)
The aim of this work is to describe the known methods of vulnerability assessment, and to implement them in a web application using the Vue.js framework. The thesis describes two vulnerability assessment systems, namely CVSS (Common Vulnerability Scoring System) and OWASP (Open Web Application Security Project) Risk Rating Methodology. Their parts, metrics and methods of calculation of the evaluation are described. Subsequently, these systems are compared and their strengths and weaknesses are determined. The work then evaluates some known vulnerabilities using these two assessment methods. The work then describes the design of the frontend and backend of the web application. The frontend uses the Vue.js framework, which allows the creation of dynamic one-page web applications. The components and layout of the application are designed. Furthermore, the appearance of the front application and its components is designed. The backend was designed to suit with the Djnago framework, which together with the django REST framework can be used to quickly create an API (Application Programming Interface) communicating with the database. A model for storing data from a frontend application was designed. The work then describes the implementation of this application divided into frontend and backend. The backend describes the implementation of the API and the database. The implementation of the model itself, serializer and methods for communication with the frontend application are described. In the frontend, a vue router is created, which is used to dynamically change the content of the page, then the components themselves are created, which serve as building blocks of the application. These components contain three parts, namely structure, JavaScript code and CSS (Cascading Sytle Sheets). Components can pass data and call functions of other components. The last part of the work is testing of the application itself. Its functionality is tested by calculating the score of already assessed vulnerabilities and some items of the OWASP ASVS (Application Security Verification Standard). Furthermore, security is tested by testing several known vulnerabilities, along with testing with OWASP ASVS.
Geoturistický potenciál vybraných lokalit národního geoparku Vysočina
Musilová, Karin
The bachelor thesis deals with the evaluation of sites that have geotourism potential. The thesis presents eight geomorphologically important localities, which are evaluated by the geomorphosites methodology. These selected localities are located in the Vysočina National Geopark. The geopark itself is compared from the point of view of land use on the basis of map data. The purpose of this work is to point out the vulnerability of the sites. Among other things, changes in the geopark landscape were assessed.
The Interplay Between Smart Cities and Disaster Risk Reduction: A Study of the City of Amsterdam
Rossi, Alice ; Špelda, Petr (advisor) ; Střítecký, Vít (referee)
The thesis examines how the development of smart cities interplays with the enhancement of Disaster Risk Reduction. Natural disasters are increasing, especially in urban areas, representing a concentration of social, economic and institutional vulnerabilities due to high population density. The development of smart cities could represent an opportunity to make urban areas safer and prepared to handle possible extreme weather events, as they are based on the development of cross-sectoral policies to deal with urban challenges and increase the city's overall efficiency. Through a single case study research of the city of Amsterdam, the thesis aims to prove the connections between smart cities and disaster risk reduction frameworks through qualitative data analysis. The findings show the overall efficiency of the approach employed by the city of Amsterdam for both the development of the smart city and disaster risk reduction. Even if the city does not explicitly state the connection between the two domains, the study found that Amsterdam's smart city policies have several elements that interplay with the framework of disaster risk reduction, enhancing its effectiveness. Keywords Smart Cities, Disaster Risk Reduction, Disaster Risk, Vulnerability, Resilience, Policy-Making Title The Interplay Between...

National Repository of Grey Literature : 77 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.