National Repository of Grey Literature 17 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Modern cyber attacks
Hodes, Vojtěch ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This bachelor's thesis deals with contemporary cyber attacks with an emphasis on denial of service attacks. In the theoretical part the thesis focuses on an analysis and description of the cyber attacks. It monitors trends in cyber attacks and also describes generators of denial of service attacks based on software and hardware platform. The practical part uses the information from the theoretical one to design tests of network devices against cyber attacks, their practical realization and a comparison between used cyber attacks. At the very end the thesis offers possible countermeasures against them.
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.
GAP analysis of information security management system
Konečný, Martin ; Tomáš,, Krejčí (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on GAP analysis of information security management system. The thesis consists of theoretical, analytical and practical part. The first part discusses the theoretical background of the issue of information and cyber security. The analytical part describes the current condition of the researched company. The thesis’s output is the draft of risk register and draft of security countermeasures implementation. The draft targets on countermeasures leading to increase information security in company.
Information security management system project
Kameníček, Lukáš ; Kotek, Luboš (referee) ; Fiala, Alois (advisor)
This diploma thesis analyses the current state of information security management in an organization. In the theoretical part of the thesis general concepts are described as well as the relations between risk management and information security, applicable laws and standards. Further, the theoretical part deals with the risk analysis and risk management, strategies, standard procedures and methods applied in this field. In the practical part a methodology is suggested for information risk analysis in a particular organization and appropriate measures are selected.
Browser Fingerprinting Detection
Saloň, Marek ; Burget, Radek (referee) ; Polčák, Libor (advisor)
The main goal of this thesis is to design and implement a mechanism that provides protection against stateless tracking with browser fingerprint. Implemented tool has a form of module that takes part of JavaScript Restrictor extension. The module allows to specify heuristics used for evaluation of visited sites that may contain browser fingerprint extraction. If suspicious activity is detected, all subsequent HTTP requests from that site are blocked to prevent the extracted fingerprint from being sent to the server. The implementation and defined heuristics were tested. The resulting module represents an effective tool against stateless tracking. The main limitation of the implementation is possible corruption of sites by blocking HTTP requests.
Proposal for the introduction of security measures for the company
Krídla, Matúš ; Andreas,, Volkov (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the design and implementation of security measures within a selected company. The aim of the work is to create a proposal for measures against possible security threats. The first chapter deals with a general introduction to the issue, describes and defines the concepts from a theoretical point of view. The second part deals with the description of the current state and analysis of selected areas of the company. At the end of this work, we focus on raising awareness of security threats and proposing measures that contribute to increasing the security of information.
The Legality of Unilateral Countermeasures in International Law
Velechovský, David ; Bílková, Veronika (advisor) ; Faix, Martin (referee)
The Legality of Unilateral Countermeasures in International Law Abstract The aim of this thesis is to examine the legality of unilateral countermeasures in international law. The term refers to measures adopted by a State in response to a wrongful act committed by another State in order to induce the wrongdoing State to comply with its obligations of cessation and / or reparation. Given the decentralized character of contemporary international law, countermeasures represent the effective mechanism of enforcement equally available (at least formally) to all States to seek the restoration of the legal relationship with the responsible State. Nevertheless, like other forms of self-help, countermeasures are liable to abuse, which is only aggravated by the controversial history of reprisals and factual inequalities between States. For this reason, countermeasures are lawful only if certain conditions are met. These conditions, nowadays codified in Draft Articles on Responsibility of States for Internationally Wrongful Acts, are the main subject of interest of this thesis, which is divided into four chapters. Chapter One deals with the concept of State responsibility and the enforcement of international law. Chapter Two is concerned with the role of countermeasures in international law, the International Law...
Browser Fingerprinting Detection
Saloň, Marek ; Burget, Radek (referee) ; Polčák, Libor (advisor)
The main goal of this thesis is to design and implement a mechanism that provides protection against stateless tracking with browser fingerprint. Implemented tool has a form of module that takes part of JavaScript Restrictor extension. The module allows to specify heuristics used for evaluation of visited sites that may contain browser fingerprint extraction. If suspicious activity is detected, all subsequent HTTP requests from that site are blocked to prevent the extracted fingerprint from being sent to the server. The implementation and defined heuristics were tested. The resulting module represents an effective tool against stateless tracking. The main limitation of the implementation is possible corruption of sites by blocking HTTP requests.
Proposal for the introduction of security measures for the company
Krídla, Matúš ; Andreas,, Volkov (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the design and implementation of security measures within a selected company. The aim of the work is to create a proposal for measures against possible security threats. The first chapter deals with a general introduction to the issue, describes and defines the concepts from a theoretical point of view. The second part deals with the description of the current state and analysis of selected areas of the company. At the end of this work, we focus on raising awareness of security threats and proposing measures that contribute to increasing the security of information.
Aplikace principu náležité péče v kybernetickém prostoru
Botek, Adam ; Honusková, Věra (referee)
The due diligence principle is a well-established general principle of international law. The adequacy of its use proved in many special regimes of international law, especially in international environmental law. Cyberspace is another regime where the application of the due diligence principle is desirable. An adequate application of the due diligence principle might mitigate the problem of attribution of cyber operations and help in denying safe havens of non-state actors, who conduct malicious operations in cyberspace. The adequacy of the application of the due diligence principle in cyberspace is further indicated by the results of discussions in international fora and by the emerging trend of support of the application in official declarations of States on the application of international law in cyberspace. The thesis further suggests how the due diligence principle should be applied by introducing three elements that trigger the due diligence obligation and three possible adjustments to them. It also identifies the essence of some controversial aspects of the application of the due diligence principle and introduces cyber- specific considerations for the determination of breaches of the due diligence obligation and evaluation of lawfulness of responses to the breach, which consist of acts of retorsion...

National Repository of Grey Literature : 17 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.