National Repository of Grey Literature 55 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Data-efficient security of cloud storages
Elis, Martin ; Fujdiak, Radek (referee) ; Člupek, Vlastimil (advisor)
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own design of possible realization. In the next part of the document, process of building a safe cloud data storage is described together with principles of ensuring its security. In the conclusion, the author focuses on comparison of cryptographic algorithms and their behavior depending on the length of a used keys.
Proposing a Risk Analysis Methodology for Critical Applications in the Banking Sector
Zajíček, Juraj ; Novák, Lukáš (referee) ; Koch, Miloš (advisor)
This diploma thesis deals with the problem of risk analysis of critical applications in banking. The sponsor is the bank operating in the Czech Republic. The thesis is based on the theoretical apparatus in the field of information security and legal normatives of the Czech Republic. The thesis analyzes the laws and directives related to the issue of risk analysis, the bank's internal regulations and the previous analyzes carried out in the bank.
Bioactive peptides as a component of anti-aging cosmetics
Jatzová, Katarína ; Obruča, Stanislav (referee) ; Muthný,, Tomáš (advisor)
Ageing is a natural part of every human life cycle. During ageing there are lots of changes in the organism. One of the main pillars of the cosmetics industry is the development of active compounds that are fighting signs of skin ageing. The components as bioactive peptides are considered to be promising anti-ageing products, mainly because of the possibility to precisely define their chemical structure and therefore achieve more effective biological targeting. One of the signs of skin ageing is the weakening of the connections between epidermal cells and the extracellular matrix, decreasing expression of adhesion molecules and molecular components of dermo-epidermal connection. The most abundant adhesive receptors in the skin are integrins. Their ligands are extracellular matrix molecules, e. g. laminin or fibronectin. The minimal recognition sequence of integrins receptors is the amino acid motif arginine- glycine- aspartic acid (RGD). This sequence is also very interesting in terms of cosmetic applications because it provides the ability to create new and effective bioactive peptides. The subject of present work is basic safety testing of four peptides with RGD motif. A sequence of three peptides was modified by addition of glycine amino acids, or alanine. The expected effect was to improve interaction with integrin receptors. In each of the sample, levels of endotoxin was determined in order to exclude any possible interfering effects on the viability of cells. Subsequently, in NIH3T3 mouse fibroblasts viability was monitored by MTT assay and morphology. The quantity of obtained protein had been determined to increase data interpretation relevance.
Design of Company Contracts Database
Kuda, Michal ; Konečný, Libor (referee) ; Kříž, Jiří (advisor)
This bachelor’s thesis deals with the issue of suitable database system selection, design and implementation. It contents the historical development overview and it’s comparing. My publication describes design of company contracts database and outlines the application programming interface.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Ways of Improving GNSS Performance for RNP-RNAV Operations
Kvíčala, Aleš ; Kevický, Dušan (referee) ; Ptáček, Pavel (advisor)
The goal of this thesis is to analyze current requirements of navigation system RNP RNAV. Particularly is behaving about estimation current ways and description of future improving GNSS performance. In submitted thesis is describes present evolution of area navigation and required navigation performance RNP. The next part deals with the common access how to raise the performance parameters, their estimation and also description how it'll be solve in future systems.
Digital signature
Vaverka, Aleš ; Lambertová, Petra (referee) ; Zeman, Václav (advisor)
Digital signature, the subject of this semester paper, is nowadays very up-to-date. The still rising capabilities of the internet and the vision of lowering the amounts of paper documentation made it necessary to develop a way of signing documents which are transferred through the internet. This is supposed to be equally safe and unassailable as the handwritten signature. This method is called the digital signature. The paper focuses on the explanation of the essential terms connected to digital signature, such as certificate, certification authority, authentication, but in particular on the elementary cryption algorithms, further on applications that make use of digital signature, e.g. post services and electronic banking. In the final chapter, the positive and negative aspects of the electronic signature are discussed.
Satellite navigation system GLONASS 2018+ (student handbook)
Navrátilová, Karolína ; Hlinka, Jiří (referee) ; Vosecký, Slavomír (advisor)
The aim of presented bachelor thesis is produce study aid on the topic global satellite navigation systém GLONASS 2018+. The work deals with the development of the system itself and signals, navigation messages and individual system segments, that makes up the system as a whole. The work also includes an overview of current development and direction of future development, as well as overview of navigation metods where the services of the GNSS are used. Part of the work is devoted the developing european´s sattelite system Galileo and american system GPS. The last chapter deals with four important criteria, i.e. availability, integrity, continuity and accuracy where the systems of GNSS are compared.
Design of methodology for vulnerability assesment
Pecl, David ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design of the own method, which aims to assess vulnerabilities that it is easier to identify those with high priority. The method is based on three groups of parameters. The first group describes the technical assessment of the vulnerability, the second is based on the requirements to ensure the confidentiality, integrity and availability of the asset and the third group of parameters evaluates the implemented security measures. All three groups of parameters are important for prioritization. Parameters describing the vulnerability are divided into permanent and up-to-date, where the most important up-to-date parameter are Threat Intelligence and easy of exploitation. The parameters of the impact on confidentiality, integrity and availability are linked to the priority of the asset, and to the evaluation of security measures, which increase the protection of confidentiality, integrity and availability. The priority of the asset and the quality of the countermeasures are assessed based on questionnaires, which are submitted to the owners of the examined assets as part of the vulnerability assessment. In the third part of the thesis, the method is compared with the currently widely used the Common Vulnerability Scoring System. The strengths of the proposed method are shown in several examples. The effectiveness of prioritization is based primarily on the priority of the asset and the security measures in place. The method was practically tested in a laboratory environment, where vulnerabilities were made on several different assets. These vulnerabilities were assessed using the proposed method, the priority of the asset and the quality of the measures were considered, and everything was included in the priority of vulnerability. This testing confirmed that the method more effectively prioritizes vulnerabilities that are easily exploitable, recently exploited by an attacker, and found on assets with minimal protection and higher priority.
Proposal of Database for Effective Functioning of a Guesthouse
Kornelly, Roman ; Luhan, Jan (referee) ; Kříž, Jiří (advisor)
This bachelor thesis is concerned with designing a database intended to streamline the activities taking place in the Rumburak s.r.o. guesthouse. The first part of the thesis presents the theoretical foundation required for tackling the problem. Following is an analysis of the processes involved in the current operations, pinpointing their problem points. The core part of the thesis focuses on the actual design comprised of a module for person management, booking and invoicing. The result of the work done on the thesis is a fully functional database that meets the requirements of the company.

National Repository of Grey Literature : 55 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.