National Repository of Grey Literature 28 records found  beginprevious19 - 28  jump to record: Search took 0.01 seconds. 
Thematization of Security Issue in Election Campaign: Election to Chamber of Deputies of the Parliament of the Czech Republic 2017
Rendla, Michal ; Křeček, Jan (advisor) ; Nečas, Vlastimil (referee)
Abstrakt_aj The thesis deals with the issue of security in the pre-election campaign to the Chamber of Deputies of the Parliament of the Czech Republic 2017, specifically in the election programmes of relevant political parties. In the theoretical part of the thesis is first discussed security, its concept, and basic security terminology. Afterward, the socio-constructivist Copenhagen school's securitization theory is presented, which provides also a suitable analytical tool, as well as election programmes, their position in the pre-election campaign and relevance for this paper. The analytical part of the thesis is divided into two levels. Using a quantitative content analysis of programmes, based on the method of the Comparative Manifesto research group, although heavily modified for the purposes of the work, the thematic content of security is mapped, the representation of specific themes across the programmes, as well as the amount of space and, hence, the attention devoted by individual parties to security topics. The analysis found that the dominant security issues in the programmes of the observed parties were Army and Defense, Migration, Migration Crisis and Asylum Policy, and finally Internal Order and Security. The second level of the content analysis is of qualitative nature and through the lens...
Security Risks in Passive Optical Networks
Šimoník, Jan ; Jeřábek, Jan (referee) ; Horváth, Tomáš (advisor)
This diploma thesis deals with the historical development of passive optical networks, according to the standards that was defined by International Telecommunication Union (APON, BPON, GPON, XG-PON and NG-PON). Further, the thesis describes the security of passive optical networks, but also a security threats which the deployment and use of passive optical technology carry. In the introductory chapters of this thesis the passive optical networks are described. The following is a description of the standards of passive optical networks in terms of their historical development. The next part is dedicated to the security of passive optical networks and possible security threats. In conclusion a description of the practical part of this thesis is given -- rack assembly, which will serve for future testing. The basic configuration of the optical line terminations that are fitted in the rack is also described. The last part of this diploma thesis is dedicated to the testing of selected security risks, which was described in the theoretical part of this thesis.
The Complexity of Security Threats in Urban Areas: The Case of Johannesburg.
Sanjoh, Charles ; Střítecký, Vít (advisor) ; Svitková, Katarína (referee)
Cities today have become a playground for man-made security threats. From terrorism, drug abuse, and different forms of physical violence that impedes the smooth functioning of the activities of those living within the city spaces. Considering the present day violence and insecurity in our cities, it is vital not only to embark on preventive measures, but also to learn how to cope with and adapt to them. Since it would be an illusion to think of eliminating violence, resilience becomes an important aspect, a gateway to move on with our daily activities without fear and with greater hope for a better future. It is in this respect that I decided in this thesis to talk about resilience within our municipalities with a special focus on the city of Johannesburg in South Africa.
Czech Public on Its Fears and on Security Threats for the Czech Republic - December 2016
Červenka, Jan
In December 2016, respondents had to assess security threats related to selected groups in the Czech Republic and they were also expressing views on threats by war, epidemics, natural disasters, economic crisis or resource crisis. These two questions were amended with an open question trying to find out, what are their current fears.
Network Protection Using NetFlow Data
Sedlář, Petr ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a summary of common security risks in term of their detection on network and transport layer. There are specified characteristics of NetFlow data containing samples of security risks. On the basis of these characteristics, an application for detection these risks is designed and implemented.
Network Protection Using NetFlow Data
Hlavatý, Ivo ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.
Computer Identification Based on Its Network Behaviour
Myška, Michal ; Halfar, Patrik (referee) ; Polčák, Libor (advisor)
This diploma thesis deals with computer identification using network behavioral patterns. Security functions providing privacy are described together with user privacy threats. Then, several approaches to the computer identification based on network behaviour are described. The proposed tool is based on data mining method Multinomial Naive Bayes. Then, the implementation of proposed tool is described and the experiments recognizing success in the identification are performed.
Security Threats for the Czech Republic in View of Public - December 2015
Tuček, Milan
In December 2015, respondents had to assess security threats related to selected groups in the Czech Republic and they were also expressing views on threats by war, epidemics, natural disasters, economic crisis or resource crisis. These two questions were amended with an open question trying to find out, which countries represent a security threat for the Czech Republic. The survey also focused on expectations concerning the future of the personal life of citizens, the future of the Czech society and the future of the whole humankind.
Security of smartphones on the Android platform
Hradil, Martin ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis focuses on security problems of smartphones, specifically on the Android Platform. The goal of the thesis is to introduce user to the history of the Android mobile operating system, what threats can users face and what are the possibilities of preventing those threats and ways to deal with their consequences. The theoretical first part is devoted to the history of the Android platform since the first public version in year 2008 to the latest version from March 20015. This section describes development of the platform, along with explanations of important innovations and features. The second part is focused on individual threats the Android users may encounter. This section contains an analysis of the various threats and the possible methods of preventing and dealing with the consequences along with recommendations for specific users groups. The third part contains an analysis of selected security application. This part contains a description and analysis of the functions together with recommendations on settings and evaluation of the application. The fourth part contains demonstration of abuse of mobile phone via USB debugging mode. In this example, the reader can learn about the risks of enabled debugging mode. The last fifth section contains description and results of a survey aimed at Android smartphone users.
Security in Oracle database
Lukanič, Michal ; Čermák, Igor (advisor) ; Pour, Jan (referee)
The amount of electronically stored data is constantly growing. That's why we should consider the data security. Most electronic information is stored in the database. This thesis is concerned with ensuring data security in the Oracle database. First of all, I describe some of the available security surveys, to make it clear why we need to ensure the data security. In addition, I also describe the main aspects of information security. The aim is to introduce what we mean by security of information. Then I examine the recommendations of ISO 17799 standard, which is one of the sources for the measures described in the main part of this thesis. The next part is dedicated to finding the important security threats, which are used as a basis for following description of security tools. The aim of described recommendations and threats is to discover what is needed to ensure the data security. In the main part of this thesis I discuss the various security tools and procedures. The main objective of this thesis is the description of tools and procedures to ensure data security, following the recommendations of international standards and typical security threats. All described tools are part of the Oracle database. I place emphasis on the user access control.

National Repository of Grey Literature : 28 records found   beginprevious19 - 28  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.