National Repository of Grey Literature 9 records found  Search took 0.01 seconds. 
USB Flashdrives Virus Detector Implemented in RaspberryPi
Polehňa, Dominik ; Pánek, Richard (referee) ; Krčma, Martin (advisor)
This thesis is focused on the analysis of internet security and the implementation of USB flashdrives virus detector. We will firstly analyze the basics of viruses and antiviruses and from gained knowledge we are going to create an automatic virus detector which doesn't need an user intervention. For impelementation will be used a platform Raspberry Pi and programming language Python.
Modern computer viruses
Malina, Lukáš ; Malý, Jan (referee) ; Pust, Radim (advisor)
Bachelor’s thesis “Modern computer’s viruses” is composed from two mainly object (analysis computer’s viruses and suggestion of security middle computer network), separated for three parts: Analysis computer’s viruses, Personal suggestion of security personal computer end-user (computer terminal) and Personal suggestion of security middle computer network. Methods of transmission and infection, specific properties of viruses and impact upon personal computers are examined in the first part. Resolution of personal suggestion of security personal computer with help of antivirus software, personal firewall and antispam software is inducted in the second part. Futher, results of testing some free AV software and other security software are summarized with possible progress of configuration and recommendation for correct running this software. Complex suggestion of security middle computer network is adduced in the third part, where is inducted structure of security network. Configuration progression and recommendation for maximum security is indicated on particular used components. Structure is adapted for active network Cisco components, which are most used around these days. Completely suggestion of security network is directed on hardware firewall Cisco PIX, where is unfolded potential possibility of options. Futher, the third part contain some important tips and recommendation for completely working network, including setting security preference, security passwords and data encryption. Also, there is described various techniques monitoring and supervision working security network using complex monitoring software MARS (Cisco security monitoring, analyzing and response system) from Cisco company.
Organization protection against malware design
Vykydal, Tomáš ; Vykydal, Miloslav (referee) ; Ondrák, Viktor (advisor)
The object of this bachelor work is to design a solution for places, where any imperfection were found.in an analysis of the current state of malware protection in a monitored company. solutions are designed for individual places, where any Result of this work is a design, which significantly increases the level of protection against malware and a description of the current situation in the problematics of malware and protection against it.
USB Flashdrives Virus Detector Implemented in RaspberryPi
Polehňa, Dominik ; Pánek, Richard (referee) ; Krčma, Martin (advisor)
This thesis is focused on the analysis of internet security and the implementation of USB flashdrives virus detector. We will firstly analyze the basics of viruses and antiviruses and from gained knowledge we are going to create an automatic virus detector which doesn't need an user intervention. For impelementation will be used a platform Raspberry Pi and programming language Python.
Organization protection against malware design
Vykydal, Tomáš ; Vykydal, Miloslav (referee) ; Ondrák, Viktor (advisor)
The object of this bachelor work is to design a solution for places, where any imperfection were found.in an analysis of the current state of malware protection in a monitored company. solutions are designed for individual places, where any Result of this work is a design, which significantly increases the level of protection against malware and a description of the current situation in the problematics of malware and protection against it.
Modern computer viruses
Malina, Lukáš ; Malý, Jan (referee) ; Pust, Radim (advisor)
Bachelor’s thesis “Modern computer’s viruses” is composed from two mainly object (analysis computer’s viruses and suggestion of security middle computer network), separated for three parts: Analysis computer’s viruses, Personal suggestion of security personal computer end-user (computer terminal) and Personal suggestion of security middle computer network. Methods of transmission and infection, specific properties of viruses and impact upon personal computers are examined in the first part. Resolution of personal suggestion of security personal computer with help of antivirus software, personal firewall and antispam software is inducted in the second part. Futher, results of testing some free AV software and other security software are summarized with possible progress of configuration and recommendation for correct running this software. Complex suggestion of security middle computer network is adduced in the third part, where is inducted structure of security network. Configuration progression and recommendation for maximum security is indicated on particular used components. Structure is adapted for active network Cisco components, which are most used around these days. Completely suggestion of security network is directed on hardware firewall Cisco PIX, where is unfolded potential possibility of options. Futher, the third part contain some important tips and recommendation for completely working network, including setting security preference, security passwords and data encryption. Also, there is described various techniques monitoring and supervision working security network using complex monitoring software MARS (Cisco security monitoring, analyzing and response system) from Cisco company.
Market analysis of security software
Doležal, Ladislav ; Benáčanová, Helena (advisor) ; Řezníček, Dušan (referee)
In this thesis, I analyze the global supply of security software (for operating system Win-dows) with a focus on anti-virus programs, which currently mostly implicitly include vari-ous modules of security software. In the first part of my thesis, I will focus on the clarification of issues related to IS / IT se-curity and cybercrime. I describe here the security IS / IT in general, describes the basic concepts and information safety, so that readers gain a basic understanding of this issue. I explain the concept of cybercrime and characterize its main crime. The second part will focus on the clarification of issues relating to security and safety not only domestic, but also corporate computers. I further characterize the greatest threats of our time for PC users and the possibility of prevention. In the third part, I will analyze the security software market analysis due to their market shares and qualifying tests conducted by recognized independent organizations, so to currently provide their full offer. Using the survey I will find out what is the awareness on the selection and use of antivirus software, and on this basis determine what antivirus software are most popular by users.
Position of a given company on Czech and world market - marketing perspective
Nováková, Jana ; Filipová, Alena (advisor) ; Brábník, Miroslav (referee)
The bachelor thesis is supposed to evaluate the position of AVAST company on Czech and world market from marketing perspective. First section describes basic theoretical marketing tools such as life cycle, competition analysis, marketing strategies etc. Second section approaches historical evolution of information technology and antivirus software. Specifically applied third section focuses on the development of AVAST company and then examines its competitive position on Czech and world market. Conclusion evaluates facts obtained from applied section and finds crucial marketing strategies, which lead AVAST to leading position on Czech and world antivirus market.
IDS system SNORT
MAURIC, Jakub
This work deals with Intrusion Detection Systems. It divides them into categories and describes their functions. It describes examples of their using. It deals primary with IDS System Snort, content of them and with an example of their implementation into an existing system. This document will be used like a short compact manual which describes a necessary theory of Intrusion Detection Systems and possibilities of their practical using.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.