National Repository of Grey Literature 98 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Cybersecurity in Smart Transport Services
Dolák, Martin ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This Bachelor thesis deals with introducing concepts of smart vehicle sharing and smart vehicle parking, their description, and analysis of individual parts of concepts. The paper also includes an analysis of cyber-attacks on these concepts and their prevention. In the practical part, the work will focus on creating a draft protocol for the vehicle smart-sharing system. The protocol will deal with the communication between the user and the server. The protocol will also implement privacy protections in the form of group signatures. Next, an application will be created that will include the measurement of cryptographic primitives, preparation for the implementation of the proposed protocol, and a Firebase service that is used to demonstrate cooperation with the protocol.
Deployment of a DLP solution in an energy company
Přikryl, Adam ; Veselý Jindřich, Ing., MBA (referee) ; Sedlák, Petr (advisor)
The diploma thesis deals with the assessment of the deployment of DLP solutions in an energy company with the consideration of transition to another supplier. The first part summarizes the theoretical background needed to understand the issues of data protection and DLP systems. The second part provides an analysis of the current state of the company. The third part presents a proposed solution, which is based on the theoretical background and analysis of the current state, includes a description of the systems, a proposal for switching to another supplier and an economic evaluation.
Economic impact of the implementation of a software tool for compliance with VKB in the corporate environment
Nováková, Natálie ; Svoboda Vlastimil, Ing., MBA (referee) ; Sedlák, Petr (advisor)
This thesis focuses on evaluating the economic impact of implementing a software tool for compliance with the Cybersecurity Decree (VKB) in a corporate environment. As part of the thesis, an analysis of available cybersecurity management tools was conducted, including a comparison of their features and functionalities. Based on the results of this comparison, a specific tool was selected that appears to be the most suitable. The output of this thesis is an economic comparison of the costs associated with each solution option.
Robotic workplace safety
Kotlík, Jan ; Blecha, Radim (referee) ; Blecha, Petr (advisor)
The topic of the bachelor's thesis is the issue of the safety of the robotic system and its introduction to the market and into operation. It contains a system analysis of the solved problem, a proposal and justification of the chosen method of solution. Furthermore, the requirements of harmonized standards and the requirements of good technical practice are processed here, from which an editable list of requirements is compiled.
Resilience of Biometric Authentication of Voice Assistants Against Deepfakes
Kaška, Petr ; Pleško, Filip (referee) ; Malinka, Kamil (advisor)
Hlasoví asistenti (Apple Siri, Amazon Alexa, Google-assistant, Samsung Bixby) podporující hlasové ovládání nabízejí stále více možností, jak nám usnadnit všechny každodenní činnosti. Lidé jim umožňují přístup k datům a informacím, aby mohli všechny tyto funkce plně využívat. Spolu s rychle se rozvíjející technologií hlasového deepfake se objevuje velká hrozba v oblasti zneužití deepfakes k oklamání chytrých hlasových asistentů. Útočník může nahrávat hlas oběti, syntetizovat hlas a vytvořit nahrávku nějakého příkazu, aby oklamal asistenta za cílem poškodit oběť. Cílem této práce je navrhnout experiment, který bude simulovat útoky, provedené syntitickým hlasem, na hlasové asistenty a následně vyhodnotit jejich obranyschopnost. Provedený experiment potvrzuje výchozí hypotézu o zranitelnosti hlasových asistentů vůči deepfake útokům a výsledky jsou velice alarmující s celkovou úspěšností 90\% naznačující nedostatečnou obranu hlasových asistentů a vyžadují zavedení dalších protiopatření, která by zabránila riziku zneužití, protože počet hlasových asistentů v aktivním používání rychle roste.
Preparing the company for the introduction of compliance for NIS2
Spišáková, Lenka ; Peter,, Smorada (referee) ; Sedlák, Petr (advisor)
The thesis addresses the issue of the newly emerging European NIS2 directive, which aims to increase cyber security in an organisation. The intention of the thesis is to implement compliance with the NIS2 directive into society. In the introductory chapter, the objectives of the thesis will be presented, followed by a description of the theoretical background and then an analysis of the current state of the project. The final chapter is devoted to the proposed solution of creating a risk analysis and the subsequent implementation of the proposal in the company.
Cyber Escape Room
Kubík, Hynek ; Burda, Karel (referee) ; Fujdiak, Radek (advisor)
This thesis explores the synergetic potential of escape games and cybersecurity education. It begins with an overview of the principles of cyber security and their importance, followed by a detailed analysis of the typologies of escape games and current trends both in the Czech Republic and internationally. Different educational frameworks and models in cybersecurity are explored, along with an analysis of tools such as Cyber Threat Defender and CyberCIEGE. The study also includes survey analysis and suggests methodologies for creating educational materials and escape games focused on cybersecurity. The findings show the effectiveness of using escape games as a dynamic tool to enhance cybersecurity education.In the practical part, this thesis focuses on designing methodologies and scenarios for escape games along with subsequent testing and optimization of the scenarios
Analysis and design of an effective solution for integration of Web Application Firewall into SOC architecture
Hynek, Vojtěch ; Komosný, Dan (referee) ; Kubánková, Anna (advisor)
The thesis deals with the issue of integration of Web Application Firewall into the environment of Supervisory Security Center. The result of this thesis is an analysis of current integration options along with identification of the most common attacks on web applications. Using the analysis performed, the best suited WAF was selected along with its integration method. Furthermore, the thesis contains a detailed description of the chosen integration and its subsequent testing. Testing of the correctness of the firewall, its stress testing and its effect on the network delay was performed. A part of the thesis also describes the integration of WAF into a real SOC environment. The integration involves connection to log management and traffic monitoring technologies. At the same time, a custom integration with the MISP platform has been developed, which makes it possible to create dynamic rules for the WAF. The integration includes the creation of a custom parser, correlation rules and a test scenario. The last part of the thesis is devoted to the analysis of the impact of the WAF integration on the prevention and detection of cyber threats, which includes an evaluation of the emerging alerts over a period of one month.
Building security awareness at the Faculty of Business and Management
Volfová, Jana ; Ondrák, Viktor (referee) ; Sedlák, Petr (advisor)
This diploma thesis is focused on Security Awareness Education at the Faculty of Business and Management. It consists of three main parts: theoretical, analytical and practical considerations. The theoretical part is the introduction to basic terms, processes and analysis to help understand the thesis. The analytical part includes an introduction to the chosen organization and the implementation of analysis, which were presented in the theoretical part. The practical part contains, among other things, the actual proposals for Security Awareness Education at the faculty and its benefits.
The Design of the Maturity Model for Measuring Effectivity of the SIEM System in the Organisation
Kosková, Zdeňka ; Lukáš,, KUBÍK (referee) ; Ondrák, Viktor (advisor)
The bachelor‘s thesis addresses the issue of evaluating the effectiveness of the SIEM system in an industrial environment. The goal was to propose a methodology that uses a MITRE ATT&CK matrix for ICS for evaluation. The thesis first analyses existing solutions and their potential applications, followed by a description of monitoring evaluation in an energy company, which together with the matrix form the basis of the proposed solution. The main output of the thesis is a proposal for quantitative evaluation of individual techniques of the matrix, such as graphical interpretation and the possibility to share results securely with other CERT teams.

National Repository of Grey Literature : 98 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.