National Repository of Grey Literature 139 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Design and implementation a phishing campaign
Kosková, Šárka ; Aleš,, Přibyl (referee) ; Sedlák, Petr (advisor)
The theoretical part defines the basic concepts related to this topic such as information and cyber security, phishing (history and types), spam, social engineering, legal responsibilities and preventive measures of fraudulent behaviour, etc. The practical part deals with the creation of a phishing campaign targeting the employees of a specific company, thanks to which it is possible to assess the overall information security. Once the campaign has been evaluated, an assessment is made as to whether the campaign was effective and what may have influenced its success.
Activities of paramedics in solving the attack of an active shooter and cooperation with the components of the Integrated Rescue System
SLABÁ, Kristýna
The topic of this bachelor's thesis is the activity of paramedics when dealing with an active shooter attack and cooperation with the components of the Integrated Rescue System. The work is divided into a theoretical and a practical part. The theoretical part is focused on defining the term active shooter, clarifying the most common gunshot wounds and their care. The following chapters are devoted to the typical activities of individual units of the IZS, exercises associated with an active shooter, and attacks that took place abroad and in the Czech Republic are also not omitted. The empirical part of the bachelor's thesis was made using a qualitative method, which was based on semi-structured interviews. 11 informants from among paramedics of the South Bohemian Region, police officers and firefighters participated in the research. Two goals were set in the work. The first goal was to map the cooperation of paramedics with components of the Integrated Rescue System. The second goal was to map the preparation of medical rescuers to deal with an attack by an active shooter. The results of the research investigation showed that the paramedics are oriented in the setting of cooperation and communication between the components of the IZS during a joint intervention, thus the first goal was fulfilled. Furthermore, the results showed that the preparation of paramedics for an active shooter attack is insufficient and the paramedics themselves do not feel prepared. The work draws attention to the possibility of increasing the frequency of personnel training in problematic active shooter situations.
Self-defense for medical staff of the Emergency Medical Service of the South Bohemian Region
ZELENKOVÁ, Iva
The subject of the bachelor's thesis is "Self-Defense for Medical Staff of the Medical Rescue Service of the South Bohemian Region." This work explores the various possibilities of self-defense - both physical and verbal - applicable to the disabling the aggressor. The theoretical part is focused on the current state of attacking exit crews. It also includes training of medical rescueworkers, including cooperation with the Police of the Czech Republic, as well as some factors that can greatly endanger healthcare professionals in their work. In the theoretical part, both the basics of self-defense - verbal and physical are mentioned, including the procedure of simple defensive techniques, for example against kicks, grips or strangulation. If an attack cannot be nullified by self-defense, we have a number of defenses, usable against the aggressor. Such a solution to the conflict also carries many risks in the area of criminal law, which is why the last chapter of the theoretical section is devoted to legal legislation. The data to process the practical part was obtained in the form of qualitative research using a semi-structured interview method with 10 employees of the Medical Rescue Service of the South Bohemian Region. We investigated whether they had experience of verbal or physical assault, how they prepared for possible assault, and whether they had any self-defense means by which to avert imminent attack in the course of their profession. The results of the investigation indicate that cooperation with the Police of the Czech Republic and early detection of the dangerous situation of the Medical Operations Centre tend to be crucial. All 10 respondents have experienced verbal aggression, half of them have experienced physical aggression. A few respondents expressed interest in self-defense courses, and those who keep fit by moving are interested in contributing to sports activities. This work can be used as an educational material for health care professionals or as a source of information in the area of self-defense and security in the South Bohemia Region.
Lab tasks on compiled language vulnerabilities
Kluka, Peter Milan ; Štůsek, Martin (referee) ; Sysel, Petr (advisor)
This graduation thesis is devoted to a detailed analysis of vulnerabilities in freely distributed open-source programs. The thesis includes a description of different types of vulnerabilities that are often associated with software attacks. Static and dynamic code testing are examined in detail, as well as the tools used to detect vulnerabilities in source code. The thesis includes the development of three lab exercises, including detailed tutorials that demonstrate the consequences of incorrect implementations. The lab tasks focus on buffer overflow, path/directory traversal, and buffer over-read vulnerabilities. Every lab task includes a demonstration of the flawed code that was responsible for the vulnerability, as well as demonstration of the patched code that was used to fix the vulnerability. These tasks provide practical examples that illustrate the risks associated with inappropriate software design and implementation and demonstrate the importance of effective security techniques in software development.
Design and implementation of countermeasures against side-channel attacks on an FPGA platform
Kuřina, Petr ; Jedlička, Petr (referee) ; Dobiáš, Patrik (advisor)
Currently, significant progress is being made in the field of digital systems and cryptography, requiring adequate security against various forms of attacks. Special attention is paid to development on the FPGA (Field-Programmable Gate Array) platform, which provides flexibility and performance for implementing diverse applications, including cryptographic algorithms. This semester thesis focuses on the systematic analysis of possible leaks of sensitive information from the implementation of a cryptographic scheme on the FPGA platform. The FPGA platform is presented in the work, including HDL (Hardware Description Language) programming languages such as Verilog or VHDL. It then presents a general overview of side channels and their types, countermeasures, and a~detailed description of security techniques. The next chapter is the AES cryptographic scheme and a description of its operations. There is a chapter devoted to a comparison of current articles on the issue. The following is a description of a professional workplace, such as an oscilloscope or a Sakura-X (Sasebo-GIII) hardware board. In the final part, the measurement results are presented without any measures, only the AES algorithm is implemented, and then in the next part there is a countermeasure proposal, which is implemented and measured. The results are described and subsequently displayed in graphic form.
Design and implementation of a module for load testing of HTTPS requests in Apache JMeter
Čížek, Šimon ; Člupek, Vlastimil (referee) ; Šeda, Pavel (advisor)
The Bachelor Thesis focuses on DDoS attacks over the HTTPS protocol and their simulations from a single network interface. Based on the analysis of options for sending requests from spoofed IPv4 and IPv6, a plugin module was developed for Apache JMeter software. Subsequently, module impacts were tested using a created scenario on Nginx and Apache2 test servers. The conclusion presents the results of the generated load on both servers.
Detection of attacks targeted at web applications
Jégrová, Eliška ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis is dealing with vulnerabilities of web applications. The aim of the work is to create tools for attack detection of certain attacks, specifically Same Origin Method Execution (SOME), XML Signature Wrapping attack, XPATH Injection, HTTP Response Smuggling and Server-Side Includes (SSI) injection. Another aim is to create logs that display detected attacks. In the first part, the theory is analyzed and vulnerabilities of chosen attacks are described including their misuse. In the next section there are web application implemented which contain vulnerabilities for successful execution of the attacks. Furthermore, in Python language detection methods are designed and developed for these attacks, which are accompanied by a log entry.
Digital Image Watermarking
Šujan, Miroslav ; Říha, Kamil (referee) ; Číka, Petr (advisor)
The bachelor´s thesis deals with the problem of static digital watermarking in frequency domain. It is a process of adding secret information to the original data without any negative influence to them, while in the same time making sure that the identification and hidden watermark cannot be removed easily. The main aim of this thesis is to sum up the current techniques of watermarking, to carry out of two watermarking techniques and a test of resistance to attacks against them.
Advanced methods of filtering network traffic in the Linux system
Peša, David ; Komosný, Dan (referee) ; Kacálek, Jan (advisor)
This master's thesis is meant to provide techniques in designing and building a standalone packet filtering firewall in Linux machines, mainly for small sites who don’t give much service to Internet users. It deals with attenuating the effect of the most common types of attacks using iptables. It guides how to design, implement, run, and maintain Firewall. Techniques for continuously monitoring attacks is attempted. It also give a historical, architectural and technical overview of firewalls and security attacks.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.

National Repository of Grey Literature : 139 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.