National Repository of Grey Literature 2 records found  Search took 0.01 seconds. 
Utilization of SIEM systems for network events monitoring
Kopřiva, Milan ; Čermák, Igor (advisor) ; Habáň, Přemysl (referee)
In the last years we can observe an increasing number of security incidents varying in their focus, motives and success rate. Attacks are often conducted by very skilled organized groups with high knowledge base and they are increasing in their sophistication and efficiency. Because of those reasons information security is now one of the main fields of interest of IT experts. This thesis deals with Security information and Event Management technology and its usage for the detection of potentially harmful activity in a company's internal network. In the first chapter the elementary concepts of security are placed into the context of this thesis. Next chapter deals with security information and event management technology itself, its clear definition and describing the main functionality. The end of the theoretical part is dedicated to the author's view of the future and also to the problems concerning the implementation of SIEM solutions including return on investment calculation which has certain specifics in security field. Main benefit coming from this thesis is a clear description and creation of use cases aimed at the detecting suspicious activity in internal computer networks combined with their deployment in SIEM solution in real environment. The practical part of this thesis is dedicated to the configuration of the chosen device and its connection to the SIEM solution, and the assessment of usability of security events generated by the threat detecting device. Based on this assessment the use cases will be modelled and then deployed in the test environment. This thesis aims to bring on overall view into the security information and event management technology, starting with its definition and base functions. The primary goal of this thesis is use case designing for real time threat detection in a practical environment.
Circumvention of Regional Restrictions in Order to Watch Videos on Demand
Kopřiva, Milan ; Pavlíček, Antonín (advisor) ; Smutný, Zdeněk (referee)
Bachelor thesis deals with the features of security tools for masking identity in terms of utility to circumvent the regional limitations of providers of an audiovisual service on demand. Thesis is divided into three general parts. In the first part the thesis is dealing with the basic theoretical features of the AV works such as resolution, colour depth, frame rate, compression and codec. An explanation of these attributes is crucial for the understanding of the remaining chapters of this thesis. In the second part of the thesis deals with the providers of AV media service on demand operating outside of the Czech Republic, which are therefore unavailable for domestic users. In this part the thesis is virtually trying to see the problems with the use of these services, particularly in terms of registration to the service and use of the tools to circumvent the regional limitations. The final, third part of this thesis presents the security tools, whose basis allows their use to circumvent the geographical restrictions. In this chapter the performances of individual tools are evaluated, whereas the evaluation has been based on the original, two-month lasting research of internet speed connection, where particular security tools were used. The conclusion proves that it is possible to use security tools for circumvent geographic restrictions at providers of AV media services on demand. To prove this statement the author made a second test, where he observed the quality of instantly playing video with the use of individual security tools within the different providers of an AV media services on demand.

See also: similar author names
8 Kopřiva, Martin
1 Kopřiva, Matěj
1 Kopřiva, Michal
Interested in being notified about new results for this query?
Subscribe to the RSS feed.