National Repository of Grey Literature 52 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Centralised web-based personal data management system
Mazur, Kornel ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
This diploma thesis deals with a central user identification and personal data management on the Internet. The first part analyzes questions of a identification process and discusses the requirements for implementation, security and user-friendliness. Subsequently, the process is designed with respect to the defined requirements. A detailed overview of possible attacks to the system and means of protection against them is also included in the thesis. The described methods are as follows: Phishing, Man in the middle, hardware modification and acoustic keypress emissions. A practical design of a identification system is discussed in the second part of the thesis. It consists of two parts: a library implementable to individual Internet services requiring a user identification and a server centrally identificating the users and storing their personal data and passwords. An implementation in Joomla content management system is also described.
Financial transaction security in electronic banking proposal
Valina, Petr ; Oprštěný, Miroslav (referee) ; Kříž, Jiří (advisor)
Bachelor’s thesis analyses electronic banking in the term of utilization, used technologies and with respect to security. It shows comparison of concrete types of electronic banking, which are being used at present. Analysis of possible risk by using electronic banking and solution proposal, which sets up interaction between bank and its client and makes behavior proposal for minimizing of security risks are integral part of this bachelor’s thesis.
Preserving Validity of MS Exchange Headers on Filtering SMTP Proxy-Server
Szabó, Peter ; Židek, Stanislav (referee) ; Richter, Jan (advisor)
The aim of this thesis is the localization and finding an optimal solution for a compatibility issue between two products, the AVG Linux Server Edition SMTP proxy-server and the Microsoft Exchange e-mail server. There are several possible solutions of this issue described and the most effective one is suggested as the final solution. In the first part, this thesis is providing a basic overview of the SMTP protocol and the protocols used in the Microsoft Exchanage server. The most common threats in the e-mail communication are also discussed here and several available solutions of protection against them are presented.
Phishing Detection in Web Pages
Beňo, Marek ; Hrivňák, Ján (referee) ; Holkovič, Martin (advisor)
This work deals with the design of a phishing attack detection and classification tool. The work describes techniques and forms of phishing attacks and availible tools and techniques for phishing detection. Based on the analysis of existing tools a solution for file classification is proposed. Implemented tool handles input parsing and creation of input model. Model is based on hybrid analysis of input file and URL. Using the YARA tool, YARA rules are applied which are then used in creation of input classification. Analysis of input model and definition of classification rules is enabled by implemented YARA module. Implemented solution makes it possible to define YARA rules for phishing classification based on the structural properties of a phishing file and features of source URL.
Application of graph databases in cybersecurity
Tichý, Dušan ; Daniel,, Tovarňák (referee) ; Sedlák, Petr (advisor)
This bachelor thesis is aimed at introducing and proposing the use of graph databases in the field of cyber security, specifically in the area of phishing emails.
Proxy servers in Internet
Henek, Jan ; Burda, Karel (referee) ; Komosný, Dan (advisor)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
Internet Criminality
Zelinka, Petr ; Konečný,, Zdeněk (referee) ; Soukup, Tomáš (advisor)
This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of this criminality, used methods and technological equipment. In the second part of diploma thesis there are suggested possible technical and legislative precautions against internet crime.
Internet Criminality
Kosek, Lukáš ; Paclíková, Vlasta (referee) ; Soukup, Tomáš (advisor)
First part of this bachelor thesis deals with computer criminality in Czech Republic, as well as abroad, and focuses on the copyright infringement. It describes different ways through which criminals obtain original works for further illegal usage. Second part of this work offers possible solutions in relation to the results of my survey.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Email Communication Problematics
Tlusťák, Karel ; Pecho, Peter (referee) ; Malinka, Kamil (advisor)
This work describes actual problems regarding to email communication. It shows how emails technically work and on these bases describes today's possibilities of email authentication. Next to it, the paper focuses on the biggest problems connected to emails - spamming and phishing. As far as spam is concerned, this work is dealing with methods of detection and filtering spam.  Phishing is demonstratively shown on virtual case of phish-attack and attention is paid to anti-phishing tools as well. Other key-part of this work is low view of email problematic. This part covers judgement and eventual punishment of spamming and phishing in accordance to Czech, European Union and other countries' legislation. The phishing, considered to be the most serious problem concerning to emails, is demonstrated by the virtual court case which shows how related organs works and what are the problems about it. Some precedential cases are discussed there as well. The last part of this work describes the implementation of simple program which uses database in the Phishtank server to analyse phishing emails.

National Repository of Grey Literature : 52 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.