National Repository of Grey Literature 18 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Risk Analysis as an Distributed Intelligent System
Orgoň, Vojtěch ; Orság, Filip (referee) ; Zbořil, František (advisor)
This text describes use of the multiagent system in the risk analyses. After account of term risk analyses and multiagent system this work describes the proposal of such system. Final work is usability the multiagent system in the risk analyses.
Modern cyber attacks
Hodes, Vojtěch ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This bachelor's thesis deals with contemporary cyber attacks with an emphasis on denial of service attacks. In the theoretical part the thesis focuses on an analysis and description of the cyber attacks. It monitors trends in cyber attacks and also describes generators of denial of service attacks based on software and hardware platform. The practical part uses the information from the theoretical one to design tests of network devices against cyber attacks, their practical realization and a comparison between used cyber attacks. At the very end the thesis offers possible countermeasures against them.
Countermeasures of power analysis
Gerlich, Tomáš ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on implementation of the algorithm. There are mention basic classification of side channels in the beginning of the work. The following chapter describes types of countermeasures against side channel attack, which the most emphasis on masking, because of possible implementations on existing cryptosystems. Masking techniques are introduces in the following chapter, where is a description of their method of masking, treatment of cipher and their resistance against attack. The practical part describes the measurements that are trying to record the power consumption of the microcontroller. Measurement was designed to examine primarily on information leakage through power side channel.
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.
Information security management system project
Kameníček, Lukáš ; Kotek, Luboš (referee) ; Fiala, Alois (advisor)
This diploma thesis analyses the current state of information security management in an organization. In the theoretical part of the thesis general concepts are described as well as the relations between risk management and information security, applicable laws and standards. Further, the theoretical part deals with the risk analysis and risk management, strategies, standard procedures and methods applied in this field. In the practical part a methodology is suggested for information risk analysis in a particular organization and appropriate measures are selected.
The Legality of Unilateral Countermeasures in International Law
Velechovský, David ; Bílková, Veronika (advisor) ; Faix, Martin (referee)
The Legality of Unilateral Countermeasures in International Law Abstract The aim of this thesis is to examine the legality of unilateral countermeasures in international law. The term refers to measures adopted by a State in response to a wrongful act committed by another State in order to induce the wrongdoing State to comply with its obligations of cessation and / or reparation. Given the decentralized character of contemporary international law, countermeasures represent the effective mechanism of enforcement equally available (at least formally) to all States to seek the restoration of the legal relationship with the responsible State. Nevertheless, like other forms of self-help, countermeasures are liable to abuse, which is only aggravated by the controversial history of reprisals and factual inequalities between States. For this reason, countermeasures are lawful only if certain conditions are met. These conditions, nowadays codified in Draft Articles on Responsibility of States for Internationally Wrongful Acts, are the main subject of interest of this thesis, which is divided into four chapters. Chapter One deals with the concept of State responsibility and the enforcement of international law. Chapter Two is concerned with the role of countermeasures in international law, the International Law...
Aplikace principu náležité péče v kybernetickém prostoru
Botek, Adam ; Honusková, Věra (referee)
The due diligence principle is a well-established general principle of international law. The adequacy of its use proved in many special regimes of international law, especially in international environmental law. Cyberspace is another regime where the application of the due diligence principle is desirable. An adequate application of the due diligence principle might mitigate the problem of attribution of cyber operations and help in denying safe havens of non-state actors, who conduct malicious operations in cyberspace. The adequacy of the application of the due diligence principle in cyberspace is further indicated by the results of discussions in international fora and by the emerging trend of support of the application in official declarations of States on the application of international law in cyberspace. The thesis further suggests how the due diligence principle should be applied by introducing three elements that trigger the due diligence obligation and three possible adjustments to them. It also identifies the essence of some controversial aspects of the application of the due diligence principle and introduces cyber- specific considerations for the determination of breaches of the due diligence obligation and evaluation of lawfulness of responses to the breach, which consist of acts of retorsion...
Aplikace principu náležité péče v kybernetickém prostoru
Botek, Adam ; Honusková, Věra (referee)
The due diligence principle is a well-established general principle of international law. The adequacy of its use proved in many special regimes of international law, especially in international environmental law. Cyberspace is another regime where the application of the due diligence principle is desirable. An adequate application of the due diligence principle might mitigate the problem of attribution of cyber operations and help in denying safe havens of non-state actors, who conduct malicious operations in cyberspace. The adequacy of the application of the due diligence principle in cyberspace is further indicated by the results of discussions in international fora and by the emerging trend of support of the application in official declarations of States on the application of international law in cyberspace. The thesis further suggests how the due diligence principle should be applied by introducing three elements that trigger the due diligence obligation and three possible adjustments to them. It also identifies the essence of some controversial aspects of the application of the due diligence principle and introduces cyber- specific considerations for the determination of breaches of the due diligence obligation and evaluation of lawfulness of responses to the breach, which consist of acts of retorsion...
The Application of the Due Diligence Principle in Cyberspace
Botek, Adam ; Bílková, Veronika (advisor) ; Lipovský, Milan (referee)
The due diligence principle is a well-established general principle of international law. The adequacy of its use proved in many special regimes of international law, especially in international environmental law. Cyberspace is another regime where the application of the due diligence principle is desirable. An adequate application of the due diligence principle might mitigate the problem of attribution of cyber operations and help in denying safe havens of non-state actors, who conduct malicious operations in cyberspace. The adequacy of the application of the due diligence principle in cyberspace is further indicated by the results of discussions in international fora and by the emerging trend of support of the application in official declarations of States on the application of international law in cyberspace. The thesis further suggests how the due diligence principle should be applied by introducing three elements that trigger the due diligence obligation and three possible adjustments to them. It also identifies the essence of some controversial aspects of the application of the due diligence principle and introduces cyber- specific considerations for the determination of breaches of the due diligence obligation and evaluation of lawfulness of responses to the breach, which consist of acts of retorsion...
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.

National Repository of Grey Literature : 18 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.