National Repository of Grey Literature 28 records found  previous9 - 18next  jump to record: Search took 0.00 seconds. 
Non-security of the Czech Army's soldiers on social networks
Kulhánek, Jan ; Ludvík, Jan (advisor) ; Kučera, Tomáš (referee)
The aim of this thesis is to examine the risk of the Czech Army not being properly secure on social networks, the behaviour of its uniformed members and their positive identification of social networking sites. The Russian aggression in the Ukraine and the hacking of Czech medical facilities have once again brought up the importance of cybersecurity and the role that it plays in the modern world, with the human factor being positively identified as the weakest link in security. This case study seeks to define the ideal types of soldier behaviour on social media and to analyse the potential risks that each type poses. To this end, this thesis first presents information necessary to fully understand the vast topic of cybersecurity on social media. Next, it defines several ideal types and their building blocks, in order to categorize the social media accounts of soldiers it later analyses. The author concludes that each defined ideal type has inherently problematic behaviours associated with it and carries with it a level of risk for the Army of the Czech Republic. However, the present user and family member ideal types were found to be the riskiest. Key words OSINT, SOCMINT, NATO, Czech Armed Forces, Cybersecurity, Security, Social media, Ideal type analysis, Social engineering Title The insecurity...
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Návrh marketingové a obchodní strategie pro začínající startup v oblasti prodeje IT služeb
Vošmerová, Lucie
Vošmerová, L. Marketing and business strategy for IT services sale start up. Bachelor thesis. Brno: Mendel University, 2020. The bachelor thesis is focused on an IT services sale start up. For this start up is created marketing and business strategy. The strategy is based on situation analysis which includes a market environment and primary and secondary data. The questionnaire is also a part of the bachelor thesis. Because of segmentation, targeting, positioning and found information is created marketing and business strategy using marketing mix. The target of the strategy is raised public awareness of start up’s services.
Attacks on computers, servers and services
Bitner, Oldřich ; Novák, Jaroslav (advisor) ; Svoboda, Vladimír (referee)
TITLE: Attacks on computers, servers and services. SUMMARY: The aim of theoretical part is to describe global software attacks on computer systems, servers and their services. It also describes the way of performing illegal attacks and dividing of attackers according to their knowledge of the issue.Practical part of the theses focuses focucec on an examination of basic safety and durability of university software systems. KEYWORDS: The attacks, attacker, computer, north, service, social engineering, foreign identity.
Psychology of Phishing Attacks During Crises: The Case of Covid-19 Pandemic
Kaliňák, Viliam ; Erkomashvili, David (advisor) ; Špelda, Petr (referee)
Events and circumstances that accompany crises such as losses of loved ones, losses of material resources, dislocation, or physical harm, have an overall negative impact on people's mental health. It is this impaired state of man which makes him vulnerable to manipulation of social engineers who wants to take advantage of him in order to enrich themselves. This was also the case of the COVID-19 pandemic, the unprecedented crisis in modern history, during which phishing and fraud campaigns rapidly increased as people have been forced to stay safe at home and spent most of a day online. This work analyzes the psychological strategies of cybercriminals on a sample of more than 200 phishing e-mails in order to understand how the situation was abused and what can be learnt to prevent it in the future. It also provides theoretical and research frameworks for researchers who can apply it also on other types of crises. The results contribute to the fields of psychology, cybercrime as well as crisis management. Keywords COVID-19, phishing, social engineering, psychology, persuasion, crises, pandemic, impersonation, pretexting
Increasing security awareness in the company
Novák, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The master’s thesis is focused on increasing security awareness in the company. The first chapter contains the theoretical background, which is necessary for creating a security education system. The second chapter deals with the analysis of the current situation, which is needed for determinating the need to increase security awareness. The third and last chapter contains the design of the education system itself.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
The pitfalls of social engineering, prevention and protection
Rytychová, Jana ; Hejda, Jan (advisor) ; Syrovátka, Oldřich (referee)
This bachelor thesis deals with the issue of social engineering, especially from the point of view of threats, which is present for society today. In addition to clarifying the concept itself, the aim of the thesis is to familiarize itself with the most common tools and methods of social engineering, with respect to expansion of information technologies, which is a golden age for the given branch. The output of this thesis is a general manual for the manager. It will form the cornerstone of information security settings and will be an imaginary counterbalance to identified threats and also as a possible tool for employee training.
Attacks on computers, servers and services
Bitner, Oldřich ; Novák, Jaroslav (advisor) ; Svoboda, Vladimír (referee)
TITLE: Attacks on computers, servers and services. SUMMARY: The aim of theoretical part is to describe global software attacks on computer systems, servers and their services. It also describes the way of performing illegal attacks and dividing of attackers according to their knowledge of the issue.Practical part of the theses focuses focucec on an examination of basic safety and durability of university software systems. KEYWORDS: The attacks, attacker, computer, north, service, social engineering, foreign identity.
Potential risks of electronic communication among secondary school teenagers
KOLEŠ, Jiří
The bachelor thesis focuses on modern electronic communication and its use by high school youth. It is aimed primarily at the possible risks connected with the use of electronic communication. The main goal of the thesis is to point out the sociopathological occurences connected with the IT communication. The theoretical part of the thesis is mainly concerned with the sociopathological occurences connected with the usage of IT communication, such as cyberbullying, stalking, sexting, cyber grooming, social engineering and manipulative communication. The practical section of the thesis explores the frequency of the use of electronic communication by high school youth, the extent in which they are acquianted with sociopathological occurences connected with electronic communication, and whether the students themselves have personally experienced cyberbullying.

National Repository of Grey Literature : 28 records found   previous9 - 18next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.