National Repository of Grey Literature 52 records found  beginprevious29 - 38nextend  jump to record: Search took 0.01 seconds. 
Financial transaction security in electronic banking proposal
Valina, Petr ; Oprštěný, Miroslav (referee) ; Kříž, Jiří (advisor)
Bachelor’s thesis analyses electronic banking in the term of utilization, used technologies and with respect to security. It shows comparison of concrete types of electronic banking, which are being used at present. Analysis of possible risk by using electronic banking and solution proposal, which sets up interaction between bank and its client and makes behavior proposal for minimizing of security risks are integral part of this bachelor’s thesis.
Proxy servers in Internet
Henek, Jan ; Burda, Karel (referee) ; Komosný, Dan (advisor)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
Email Communication Problematics
Tlusťák, Karel ; Pecho, Peter (referee) ; Malinka, Kamil (advisor)
This work describes actual problems regarding to email communication. It shows how emails technically work and on these bases describes today's possibilities of email authentication. Next to it, the paper focuses on the biggest problems connected to emails - spamming and phishing. As far as spam is concerned, this work is dealing with methods of detection and filtering spam.  Phishing is demonstratively shown on virtual case of phish-attack and attention is paid to anti-phishing tools as well. Other key-part of this work is low view of email problematic. This part covers judgement and eventual punishment of spamming and phishing in accordance to Czech, European Union and other countries' legislation. The phishing, considered to be the most serious problem concerning to emails, is demonstrated by the virtual court case which shows how related organs works and what are the problems about it. Some precedential cases are discussed there as well. The last part of this work describes the implementation of simple program which uses database in the Phishtank server to analyse phishing emails.
Preserving Validity of MS Exchange Headers on Filtering SMTP Proxy-Server
Szabó, Peter ; Židek, Stanislav (referee) ; Richter, Jan (advisor)
The aim of this thesis is the localization and finding an optimal solution for a compatibility issue between two products, the AVG Linux Server Edition SMTP proxy-server and the Microsoft Exchange e-mail server. There are several possible solutions of this issue described and the most effective one is suggested as the final solution. In the first part, this thesis is providing a basic overview of the SMTP protocol and the protocols used in the Microsoft Exchanage server. The most common threats in the e-mail communication are also discussed here and several available solutions of protection against them are presented.
Centralised web-based personal data management system
Mazur, Kornel ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
This diploma thesis deals with a central user identification and personal data management on the Internet. The first part analyzes questions of a identification process and discusses the requirements for implementation, security and user-friendliness. Subsequently, the process is designed with respect to the defined requirements. A detailed overview of possible attacks to the system and means of protection against them is also included in the thesis. The described methods are as follows: Phishing, Man in the middle, hardware modification and acoustic keypress emissions. A practical design of a identification system is discussed in the second part of the thesis. It consists of two parts: a library implementable to individual Internet services requiring a user identification and a server centrally identificating the users and storing their personal data and passwords. An implementation in Joomla content management system is also described.
Phishing and suitable protection against it
Trepáčová, Veronika ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis covers the issue of phishing and suitable protection against it. In the theoretical part are firstly explained the basic characteristics, development, types and techniques of phishing and also the concept of social engineering. Phishing emails are further divided into categories and according to their major features is possible to observe the differences of each individual group of e-mails and their increasing perfection. The last theoretical chapter focuses on the Internet banking in the Czech Republic. The aim of this section is to point out the ability and the means of informing banks' clients about security and potential dangers when working with Internet banking. The banks with the largest number of clients were selected and were evaluated through analysis of security webportals based on the specified criteria. The main objective, which is met by the practical part of the thesis, is to create a handbook for a user of the Internet and Internet banking. User can find in this handbook necessary advice, recommendations and procedures to be followed when receiving a suspicious email and identifying potential threat.
Socio-technical attacks
Urbanová, Anna ; Pavlíček, Luboš (advisor) ; Palovský, Radomír (referee)
The main objective of this work is to identify how students from the University of Economics, in Prague, looks at their results in two different socio-technical surveys. First, survey no. 1, focuses on the security of password and the second survey, no. 2, looks at how phishing e-mails are detected. In both cases to obtain the results of the surveys, questionnaires were used. After the surveys were completed, we promised that we would inform the students of their results from their questionnaires. The whole thesis is divided into six chapters. The first four chapters are based on theoretical information about social engineering. The last two chapters contain the practical part of the thesis, survey no. 1 and 2. The main benefits of this thesis are the results from the two surveys, which focused on the way that social engineering is attacked. Each survey was completed with the help of questionnaires and highlight the potential risks that social engineering poses to society.
Techniques and security in cases of fraud of selected types of Electronic banking
Abu Dayeh, Christián ; Půlpánová, Stanislava (advisor) ; Šafařík, Miroslav (referee)
The main topic of the thesis are different methods of Electronic banking fraud and options of Electronic banking security. The history of Electronic banking and current legal regulations including definition of some ambigious terms are described in the first part. In this part there are also described means of remote access to Electronic banking, which also outlines present options of online communication with the bank. Analysis of different methods and practical forms of fraud of different kinds of Electronic banking are described in the next part. The fraud of payment cards and internet banking are those that are mostly specified. Various types of security and fraud prevention including solutions of problems that may arise are outlined in the last part. Responsibility for fraud is portrayed in the very last part of the thesis.
The Problematics of Phishing
Kemr, Jakub ; Klíma, Tomáš (advisor) ; Pavlíček, Luboš (referee)
Bachelor thesis focuses on still current and specific type of cybercrime called phishing. The goal of the thesis is to introduce an ordinary internet user to the phishing issue by describing the functionality of different techniques of attack and appropriate ways of prevention and defence against these types of cyber-attacks. The thesis is divided into three parts. Theoretical part deals with the introduction to the phishing issue and historical development of this fraudulent technology since the early 90s of the 20th century. Furthermore, the theoretical part describes the functionality of different types of phishing techniques from the most famous to the less well-known. The end of the theoretical part describes the prevention and defence possibilities at user, software and organizational level. The second part of the work focuses on the analysis of phishing attacks. First the thesis analyses some of the recent attacks on Czech clients, in particular their structure, progress and the real purpose. The following parts show the preparation and process of one classic and one modern attack with examples of detection and possibilities of appropriate defence against these specific techniques. Final part of the thesis shows the results of the survey and phishing quiz, focused on ordinary internet users and their awareness of this issue.
Phishing
Rácz, Pavel ; Sova, Martin (advisor) ; Luc, Ladislav (referee)
The aim of my bachelor thesis is to analyze the phishing issue. Theoretical part of the thesis familiarizes readers with the term phishing and its types and red flags as well as the legislative in the Czech and Slovak republic. Practical part covers the statistical analysis of the selected indicators, like the number of the phishing domains, phishing attacks, or the number of reported phishing suspects or its targets in sectors in 2011, 2012, and 2013. Statistical analysis covers the development of the selected indicators worldwide, as well as in terms of Czech and Slovak national domains. The last chapter is dedicated to identify trends of the selected indicators based on the findings that help future forecast of the development of the selected indicators. The end of the thesis itself concludes individual studies which I derived the data from.

National Repository of Grey Literature : 52 records found   beginprevious29 - 38nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.