National Repository of Grey Literature 9 records found  Search took 0.00 seconds. 
Cryptography on Programmable Smart Cards
Wikarská, Dagmar ; Ricci, Sara (referee) ; Hajný, Jan (advisor)
Tato práce se zabývá problematikou kryptografických schémat využívajících anonymní pověření a revokační schéma. Využívá čipové karty jako anonymní autentizační zařízení s revokací za použití černých listin. Finálním výstupem je implementace revokačního schématu CDH16 na platformě MultOS. Bezpěčná autentizační zařízení používané v bankovnictví, dopravě či přístupu do budov, zvyšují anonymitu uživatele. Pro zabránění přístupu k privátním datům uloženým na kartě lze využít tyto implementované protokoly. Přidané revokační schéma zabraňuje zneužití revokovaných karet pomocí černé listiny. Karty produkující důkazy nacházající se na takové černé listině, jsou zablokovány a verifikace selže. Tento mechanismus tedy vyžaduje pravidelnou aktualizaci černých listin u všech ověřovatelů pro každou epochu.
Proxy servers in Internet
Henek, Jan ; Burda, Karel (referee) ; Komosný, Dan (advisor)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
Ssh Attacks Detection on Netflow Layer
Marek, Marcel ; Barabas, Maroš (referee) ; Michlovský, Zbyněk (advisor)
This bachelor's thesis briefly describes the basic principles of SSH protocol, its architecture and used encryption. The thesis is mainly focused on datamining information from low-level network communication and usage of its results for attacks detection. It also describes dictionary attacks used on SSH service and with NetFlow shows further possibilities of increasing network security.
Blacklist of unfair business practices used against consumers
Tichá, Sabina ; Patěk, Daniel (advisor) ; Tomášek, Petr (referee)
Blacklist of unfair business practices used against consumers This thesis focuses on the blacklist of unfair commercial practices, which is a designation for an exhaustive list of specific unfair practices which a consumer may face in business relations with a seller and which are prohibited due to their unfair nature. This list forms Annexes 1 and 2 to the Act No. 634/1992 Coll., on Consumer Protection and an Annex I to the Directive 2005/29/EC of the European Parliament and of the Council concerning unfair business-to-consumer commercial practices in the internal market. The thesis begins by outlining the European regulation of consumer protection prior to the adoption of this Directive, from the origin of an idea to create a blacklist through its realization in a form of an Annex to the Directive to its implementation into national law in the member states. The blacklist is an integral part of the process of assessing unfairness of commercial practices. It is the first step of the whole process. For that reason, in the second part of the thesis, the reader is guided through the process of assessing whether a commercial practice is unfair and therefore prohibited and the main subjects of the commercial transactions are defined - the consumer and the seller. The following third and main part of...
Cryptography on Programmable Smart Cards
Wikarská, Dagmar ; Ricci, Sara (referee) ; Hajný, Jan (advisor)
Tato práce se zabývá problematikou kryptografických schémat využívajících anonymní pověření a revokační schéma. Využívá čipové karty jako anonymní autentizační zařízení s revokací za použití černých listin. Finálním výstupem je implementace revokačního schématu CDH16 na platformě MultOS. Bezpěčná autentizační zařízení používané v bankovnictví, dopravě či přístupu do budov, zvyšují anonymitu uživatele. Pro zabránění přístupu k privátním datům uloženým na kartě lze využít tyto implementované protokoly. Přidané revokační schéma zabraňuje zneužití revokovaných karet pomocí černé listiny. Karty produkující důkazy nacházající se na takové černé listině, jsou zablokovány a verifikace selže. Tento mechanismus tedy vyžaduje pravidelnou aktualizaci černých listin u všech ověřovatelů pro každou epochu.
Proxy servers in Internet
Henek, Jan ; Burda, Karel (referee) ; Komosný, Dan (advisor)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
Ssh Attacks Detection on Netflow Layer
Marek, Marcel ; Barabas, Maroš (referee) ; Michlovský, Zbyněk (advisor)
This bachelor's thesis briefly describes the basic principles of SSH protocol, its architecture and used encryption. The thesis is mainly focused on datamining information from low-level network communication and usage of its results for attacks detection. It also describes dictionary attacks used on SSH service and with NetFlow shows further possibilities of increasing network security.
Email SPAM, trends, risks and countermeasures
Čepička, Tomáš ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals current spam problematics. The goal of this thesis is to introduce spam problematics to an ordinary computer user and It's solutions such as most common ways of protection against spam as well as testing these methods. This thesis is divided into two parts, theoretical and practical. Theoretical part is about history of spam and evolution to form as It is known today. Various kinds of spam, including risks that are involved, are introduced. A major attention is paid to each single method of anti-spam protection. These methods are explained in detail including advantages and disadvantages. The final part of this section discusses legislative issues. The beginning of practical part is dedicated to market analysis. A few free email hostings are chosen based on this analysis and tested using several tools to prove their real effectiveness and validity of anti-spam protection. At the ending the results are analyzed, afterwards recommended the best anti-spam protection.
Consumer protection - unfair commercial practices
Laurenčíková, Emma ; Zeman, Jiří (advisor) ; Filipová, Alena (referee)
The goal of the bachelor thesis is to analyse the current legal regulation of consumer protection in Czech Republic and European Union, to compare eventual differences and after that to map the views of Czech consumer on this topic. The comparison concerns also the definition of consumer, which achieved the maximum unification after enactment of the Consumer Rights Directive in 2011. The thesis deals with unfair commercial practices focusing on the term since the implementation of the Unfair Commercial Practices Directive. In the last part the thesis contains analysis of a research based on questionnaire concerning perception and opinions of Czech consumers on consumer protection and unfair commercial practices. The questionnaire also examines knowledge of consumer rights in four specific cases. Finally, the results are compared with Eurobarometer researches 2011.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.