National Repository of Grey Literature 63 records found  beginprevious44 - 53next  jump to record: Search took 0.00 seconds. 
Security of smartphones on the Android platform
Hradil, Martin ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis focuses on security problems of smartphones, specifically on the Android Platform. The goal of the thesis is to introduce user to the history of the Android mobile operating system, what threats can users face and what are the possibilities of preventing those threats and ways to deal with their consequences. The theoretical first part is devoted to the history of the Android platform since the first public version in year 2008 to the latest version from March 20015. This section describes development of the platform, along with explanations of important innovations and features. The second part is focused on individual threats the Android users may encounter. This section contains an analysis of the various threats and the possible methods of preventing and dealing with the consequences along with recommendations for specific users groups. The third part contains an analysis of selected security application. This part contains a description and analysis of the functions together with recommendations on settings and evaluation of the application. The fourth part contains demonstration of abuse of mobile phone via USB debugging mode. In this example, the reader can learn about the risks of enabled debugging mode. The last fifth section contains description and results of a survey aimed at Android smartphone users.
Procedures of information risk management of software companies.
Fischer, Radek ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
Subject of the thesis is to take up possibilities of practical using of the Risk analysis which is a part of the Information security management system. Thesis is focused on risk management for typical organization which creates information systems. Main part of the thesis is the description of "ČSN ISO/IEC 27005:2013 - Information technology - Security techniques -- Information security risk management" standard, how could this standard be applied and also contains the explanation of typical examples of assets which can be in similar types of organizations. Theoretical part is aimed on explanation of key words in literature and closer description of organizations which creates this standard. Practical part shows creation of the Risk analysis methodology according to different accesses that are contained in this standard. Thesis continues with application of specific part of this methodology in practice. Assumed contribution of this thesis is better understanding to the process of making the Risk analysis methodology and possibilities its application in practice.
Malware - threats and countermeasures
Hejduk, Jakub ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor's thesis addresses the issue of a threat in the area of computers and internet networks, malware. It defines what malware is, its various types and the history in terms of occurrence and actions. It also provides the reader with insight into malware's functionality and how it threatens users. Furthermore, the thesis contains examples of some current well-known threats. A dossier on antivirus and antispyware software is also included. It is essentially a summary of their functions, properties, benchmark results and a list of countermeasures it equips the user with. The last section of the theoretical part of the thesis is a prediction of the future regarding the evolution of these threats and how will they affect the user. A considerable part of this work is a survey providing a summary of the current level of malware knowledge among people. I intend to determine if people are aware of these threats, their ability to defend themselves against them and also whether they already encountered this issue and if so, how did they handle it. This thesis should increase awareness about malware to make people understand what it is capable of in the environment of an unsecured computer. Ultimately, I am going to present the results of the survey and evaluate the depths of knowledge about malware among people.
Analysis of deal-of-the-day services market from the viewpoint of security
Maskaliunets, Stanislau ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
In this bachelor thesis I analyze the market of deal-of-the-day services from the viewpoint of security. First of all, I describe the security of the information systems as a term. I also explain the methods of securing web applications. Web applications run on HTTP protocol, and the more secure web applications use the HTTPS protocol, which contains the TLS/SSL. In this work I describe working principle of HTTP protocol. I also describe the SSL/TLS protocols and methods of their acquiring. In the theoretical part, I also describe the methods of cryptography. In the practical part, I describe the methods of defense against attacks and analyze the deal-of-the-day services. I describe the evolution of both the world and Czech deal-of-the-day services. At the end, I analyze deal-of-the-day websites security and compare the results of this analysis.
Email SPAM, trends, risks and countermeasures
Čepička, Tomáš ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals current spam problematics. The goal of this thesis is to introduce spam problematics to an ordinary computer user and It's solutions such as most common ways of protection against spam as well as testing these methods. This thesis is divided into two parts, theoretical and practical. Theoretical part is about history of spam and evolution to form as It is known today. Various kinds of spam, including risks that are involved, are introduced. A major attention is paid to each single method of anti-spam protection. These methods are explained in detail including advantages and disadvantages. The final part of this section discusses legislative issues. The beginning of practical part is dedicated to market analysis. A few free email hostings are chosen based on this analysis and tested using several tools to prove their real effectiveness and validity of anti-spam protection. At the ending the results are analyzed, afterwards recommended the best anti-spam protection.
Internet start-up projects and their risks
Sládek, Pavel ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
The goal of this thesis is to analyse the field of the Internet startups and to find out what trends and risks are associated with their development and launching. The first chapter of this thesis summarizes the main changes in recent years and the methodologies that are the most often used in developing of startups. The work also reflects a problem connected with financing, such as investor interest in emerging projects. Then there is explained how startup investing works and what opportunities there are for investors to finance internet projects these days. The second chapter focuses on the internet startup Postuj.cz, on mistakes made during its implementation and risks that affected its starting up. The thesis includes an explanation of basic concepts in order to provide an insight into the current situation and an inspiration for starting similar projects. The main contribution of this paper is the analysis of the risks that the founder must consider in the early stages of starting his business, how to start your own startup, what might be important in the development and what less. For those interested in starting their own startup, there are presented several ways, that can help them to increase the chances of success.
System dynamics of the quality management projects
Ambrož, Ondřej ; Mildeová, Stanislava (advisor) ; Luc, Ladislav (referee)
Diploma thesis looks into the application of system dynamics and system thinking principles into the projects of quality management. This application offers the new perspective of project of quality management, which uncovers concealed relationships among entities of the system. The principles are specifically applied on the DMAIC cycle of the Six Sigma methodology. The goal of this thesis is to reveal the relationships between the key entities of the cycle, the revelation of the system archetypes with the negative impact on project management triangle and to propose recommendations to eliminate or minimize the negative impact. The goals of the thesis are fulfilled with the methods of analysis of the theoretical ground and its synthesis based on mutual characteristics across the examined areas of System dynamics, Project dynamics, Project management and Quality management. In the practical application the used methods are generalization, deduction, analysis and synthesis of the new systemic and dynamical perspective of the DMAIC cycle. The technical tool used in this process is Causal Loops Diagram. The research has proven the presence of free kinds of system archetypes in the DMAIC cycle, for which are suggested recommendations to eliminate the negative impact on the key indicators. The main contribution of the thesis is the systemic and dynamic approach of the quality management projects, which reveals nonlinear relationships and potentially harmful behavior, which would remain undiscovered under the linear perspective of the system relationships.
Comparison of test management tools
Ihnát, Ján ; Oškrdal, Václav (advisor) ; Luc, Ladislav (referee)
The Master thesis deals with the selection of test management tool for the type of project and an overview of these tools. The subject of the theoretical part is to familiarize reader with the concept of testing, its effect on the quality and risk, describe it as a process and what principles are used for testing. In the theoretical part we also focus on the division of testing by the model of the project life cycle and test levels and the description of the tools that are used for testing. In the practical part we describe agent for multi-criterial selection of test management tool, which have we created, preceded by a specification of the projects for which the agent was tested. In the next section we describe the test management tools, which were selected for comparison based on research. In the last part of the practical part the agent for multi-criterial selection is subjected to the test on three projects. The test has proven the agent to be correct and on that basis we were able to choose three specific tools for the three projects.
The proposal to use agile development procedures of Scrum framework with UML modeling language applicable for creating websites
Kučera, Antonín ; Oškrdal, Václav (advisor) ; Luc, Ladislav (referee)
The main goal of this diploma thesis is the proposal to use agile development procedures of Scrum framework with UML modeling language applicable for creating websites of small scale. The emphasis is especially put on creating a practically usable type model of the websites. The theoretical part of the thesis has two main chapters. In the "Agile methodology" chapter are listed principles of agile approach to creating software. The next part of this chapter is focus on agile methodologies (Scrum, XP, ASD, FDD, DSDM, LD and Crystal). In the "UML" chapter is introduced modeling language UML and its principles. The next part of this chapter is focus on UML diagrams used in practical part of this thesis (use case diagram, class diagram, sequence diagram, activity diagram and deployment diagram). The practical part of this thesis focuses on the design type model for creating websites of small scale. The type model is based both on the theoretical part of this work and practical experience of the author. In the first part is introduced scheme of model, where is shown the mutual relationship of individual phases. In the next part of this chapter are discussed the individual phases where is used the principle of agile development framework Scrum and examples of use of the UML diagrams.
Smartphone security
Rahm, Vladimír ; Luc, Ladislav (advisor) ; Doucek, Petr (referee)
This bachelor's thesis is focused on smartphone security risks and their solutions. The work is divided into three parts. The first part deals with the theoretical background in the form of a summary version of the most popular mobile operating systems. The second part focuses on three aspects, which are linked to the security of smartphones.In this section you can find an analysis of security risks for smartphones followed by the selection of most widely used mobile operating system in which it is exploring its security against malicious applications. In conclusion to this part a security analysis of a specific smartphone application is formed. The third part of this thesis is devoted to preventing security risks in the form of antivirus applications for smartphones. Within this section is created an overview of security products and analysis of whether these products can deal with security risks. The third part also analyzes user awareness of smartphone security risks and that is obtained by evaluation of survey among users.

National Repository of Grey Literature : 63 records found   beginprevious44 - 53next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.