Národní úložiště šedé literatury Nalezeno 5 záznamů.  Hledání trvalo 0.00 vteřin. 
Cyber security for power engineering
Sedláková, Dáša ; Kohout, David (oponent) ; Mlýnek, Petr (vedoucí práce)
Due to the IT and OT networks convergence, industrial systems are becoming vulnerable to different forms of security threats including rapidly growing cyber-attacks. Thesis is focused on an analysis of security recommendations in IEC 62351, vulnerability testing of industrial communication protocols (e.g., IEC 61850) and mitigations proposal. An ATT&CK framework for ICS was chosen to become a methodology base for vulnerability testing. ATT&CK tactics and techniques were used to practically test vulnerability scans, SMV time synchronization, GOOSE spoofing, MMS Man in the Middle and ICMP Flood attacks. Attacks tested were evaluated with a risk analysis. Subsequently, mitigation measures were proposed on several levels (OT, IT, perimeter and physical level).
Amplifying Cyber Threat Intelligence Analysis with Honeypots
Janout, Vladimír ; Gerlich, Tomáš (oponent) ; Ricci, Sara (vedoucí práce)
This thesis aims to research honeypots as a source of data for cyber threat intelligence analysis. To conduct this, a honeypot instance is configured and exposed to the internet in the cloud for a specified period. In the next part, a Python tool for querying three threat intelligence feeds is proposed. This tool serves for indicator enrichment. The utility of the tool is demonstrated in practice by enabling the analysis of indicators observed on the honeypot infrastructure. The last part of the work discusses the results and trends in the attacker’s behaviour based on the collected and processed data. In a case study, the focus is given to a single SSH session of interest and the acquired knowledge from it is mapped to the MITRE ATT&CK framework revealing attackers tactics, techniques and procedures.
Mapování opatření pro kybernetickou bezpečnost: Od legislativy k technické implementaci
Hopp, Jiří ; MSc, Mezera Michal, (oponent) ; Sedlák, Petr (vedoucí práce)
V diplomové práci jsem se zaměřil na vytvoření systematické pomůcky pro mapování technických opatření k legislativním požadavkům a povinnostem v oblasti kybernetické bezpečnosti. V práci jsem provedl analýzu řešené problematiky, ze které vyplynuly možnosti tvorby nástroje a blížící se změny v legislativních požadavcích na základě směrnice Evropské unie NIS2. V praktické části jsem popisoval tvorbu nástroje v podobě tabulky, který byl vyhovující požadavkům zadavatele a mapoval technická opatření k jednotlivým bodům současných i z NIS2 plynoucích legislativních požadavků. Na základě rozhovoru se zadavatelem jsem konstatoval, že byly úspěšně dosaženy stanovené cíle práce a vytvořený nástroj bude využíván v reálném prostředí.
Amplifying Cyber Threat Intelligence Analysis with Honeypots
Janout, Vladimír ; Gerlich, Tomáš (oponent) ; Ricci, Sara (vedoucí práce)
This thesis aims to research honeypots as a source of data for cyber threat intelligence analysis. To conduct this, a honeypot instance is configured and exposed to the internet in the cloud for a specified period. In the next part, a Python tool for querying three threat intelligence feeds is proposed. This tool serves for indicator enrichment. The utility of the tool is demonstrated in practice by enabling the analysis of indicators observed on the honeypot infrastructure. The last part of the work discusses the results and trends in the attacker’s behaviour based on the collected and processed data. In a case study, the focus is given to a single SSH session of interest and the acquired knowledge from it is mapped to the MITRE ATT&CK framework revealing attackers tactics, techniques and procedures.
Cyber security for power engineering
Sedláková, Dáša ; Kohout, David (oponent) ; Mlýnek, Petr (vedoucí práce)
Due to the IT and OT networks convergence, industrial systems are becoming vulnerable to different forms of security threats including rapidly growing cyber-attacks. Thesis is focused on an analysis of security recommendations in IEC 62351, vulnerability testing of industrial communication protocols (e.g., IEC 61850) and mitigations proposal. An ATT&CK framework for ICS was chosen to become a methodology base for vulnerability testing. ATT&CK tactics and techniques were used to practically test vulnerability scans, SMV time synchronization, GOOSE spoofing, MMS Man in the Middle and ICMP Flood attacks. Attacks tested were evaluated with a risk analysis. Subsequently, mitigation measures were proposed on several levels (OT, IT, perimeter and physical level).

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.