National Repository of Grey Literature 16 records found  previous11 - 16  jump to record: Search took 0.00 seconds. 
Network Protection Using NetFlow Data
Hlavatý, Ivo ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.
Computer Identification Based on Its Network Behaviour
Myška, Michal ; Halfar, Patrik (referee) ; Polčák, Libor (advisor)
This diploma thesis deals with computer identification using network behavioral patterns. Security functions providing privacy are described together with user privacy threats. Then, several approaches to the computer identification based on network behaviour are described. The proposed tool is based on data mining method Multinomial Naive Bayes. Then, the implementation of proposed tool is described and the experiments recognizing success in the identification are performed.
The role of Hamas in the Israeli-Palestinian conflict
Hortová, Silvie ; Havlová, Radka (advisor) ; Volenec, Otakar (referee)
The bachelor thesis deals with the theory of the clash of civilizations especially among Jewish and Islamic cultures, then it tackles the current security issue of terrorism. Theoretical and methodological basis is applied to the issue of the Israeli-Palestinian conflict, especially on the Palestinian organization Hamas, which since the late 80s of the 20th century, operates on the territory of the Gaza Strip. This work comprehensively explains the development, activities and the style of attacks perpetrated by Hamas. The main goal of this thesis is to clarify that Hamas embodies one of the obstacles which prevent the Middle East from the lasting peace.
Security of smartphones on the Android platform
Hradil, Martin ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis focuses on security problems of smartphones, specifically on the Android Platform. The goal of the thesis is to introduce user to the history of the Android mobile operating system, what threats can users face and what are the possibilities of preventing those threats and ways to deal with their consequences. The theoretical first part is devoted to the history of the Android platform since the first public version in year 2008 to the latest version from March 20015. This section describes development of the platform, along with explanations of important innovations and features. The second part is focused on individual threats the Android users may encounter. This section contains an analysis of the various threats and the possible methods of preventing and dealing with the consequences along with recommendations for specific users groups. The third part contains an analysis of selected security application. This part contains a description and analysis of the functions together with recommendations on settings and evaluation of the application. The fourth part contains demonstration of abuse of mobile phone via USB debugging mode. In this example, the reader can learn about the risks of enabled debugging mode. The last fifth section contains description and results of a survey aimed at Android smartphone users.
Security in Oracle database
Lukanič, Michal ; Čermák, Igor (advisor) ; Pour, Jan (referee)
The amount of electronically stored data is constantly growing. That's why we should consider the data security. Most electronic information is stored in the database. This thesis is concerned with ensuring data security in the Oracle database. First of all, I describe some of the available security surveys, to make it clear why we need to ensure the data security. In addition, I also describe the main aspects of information security. The aim is to introduce what we mean by security of information. Then I examine the recommendations of ISO 17799 standard, which is one of the sources for the measures described in the main part of this thesis. The next part is dedicated to finding the important security threats, which are used as a basis for following description of security tools. The aim of described recommendations and threats is to discover what is needed to ensure the data security. In the main part of this thesis I discuss the various security tools and procedures. The main objective of this thesis is the description of tools and procedures to ensure data security, following the recommendations of international standards and typical security threats. All described tools are part of the Oracle database. I place emphasis on the user access control.
Systémy detekce průniků
Klečka, Jakub ; Doucek, Petr (advisor) ; Pacík, Jan (referee)
Vzhledem k rostoucímu trendu využívání Internetu, nejen k získávání dat a informací, ale i jejich zneužití, roste význam jednotlivých prvků zabezpečení. Důležitou součást obrany informačního systému tvoří Systémy detekce průniku (IDS - Intrusion Detection System), které v reálném čase sledují provoz na síti a jsou schopny vyhodnotit a odfiltrovat nežádoucí komunikaci. Nasazení IDS je komplexní proces, který má dopad na celou organizaci a proto je třeba důkladně zvážit všechna jeho specifika a rozhodnout, zda-li bude IDS skutečně přínosem.

National Repository of Grey Literature : 16 records found   previous11 - 16  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.