National Repository of Grey Literature 38 records found  beginprevious29 - 38  jump to record: Search took 0.00 seconds. 
Security policyes of SELinux for selected application in Gnome environment
Sládek, Michael ; Palovský, Radomír (advisor) ; Vadinský, Ondřej (referee)
The goal of this work is creation of SELinux security policy for selected application. To achieve this goal is this work divided to several parts. The first part is presentation of basic security principles, on which SELinux is based and then presentation of structure of the SELinux itself. The second part is analysis of the degree of support of SELinux in some selected, user favorite, distributions of Linux. In the last part is, on the specific application, presented process of creation of SELinux security policy. Specifically, remaking of document browser Evince into secure browser of untrusted documents. The contribution of this work is to create a working policy for application Evince for GNOME user environment and mapping the extent of SELinux support in selected Linux distributions.
Registr IT rizik
Kohout, Karel ; Doucek, Petr (advisor) ; Luc, Ladislav (referee)
The theoretical part of the thesis analyzes several selected methodologies and best-practices related to information technology risks management, with focus on documents and guidance developed by ISACA. It builds a set of ideas and basic requirements for effective model of an IT risk register. Strong emphasis is placed on mapping CobiT 4.1 based Risk IT to COBIT 5. The practical part describes implementation of an exploratory web-based IT risk register in Python programming language utilizing the Django framework and employs concepts from the analysis.
Computer Crime and Czech Republic
Glykner, Martin ; Sigmund, Tomáš (advisor) ; Zavrtálek, Jan (referee)
This bachelor thesis deals with computer crime in Czech Republic considering the legal point of view. It makes the reader familiar with development of cyber crime in the world and especially in Czech Republic. It deeply describes czech legal framework of fighting computer crime and its international context. This description contains examples of particular crimes and articles of law that apply to them. The paper also describes institutions that are engaged in combating this crime. Afterwards problems complicating the fight against cybercrime are found and solutions leading to their removal are proposed.
Penetration testing of servers
Vovesný, Martin ; Pavlíček, Luboš (advisor) ; Bykadorov, Andrej (referee)
This thesis is focused on the security rating dilemma of computer defense with the help of penetration testing tools. The author's goal is to test company's specific servers and evaluate their security in the view of potential network attacks. Furthermore, during the penetration testing the author is using already known and secure methods. He uses this methodology with these tools which have demonstrated practical usability.
Computer accounting
Guzý, Ladislav ; Ďurianová, Gabriela (advisor)
The first part of the bachelor thesis acquaints the reader with the history of bookkeeping, description of the typical signs of accounting maintained on the computer, which forms the main part of this thesis, the legal specification of computer accounting, computer security and archiving of accounting documents. The second part deals with different types of computer programs and their specifics in practice.
Operating Systems' Resource Access Control Models
Vopička, Adam ; Pavlíček, Luboš (advisor) ; Palovský, Radomír (referee)
The thesis deals with models used in access control to operating systems' resources. The thesis' goals are the theoretical description of these models and their comparison, the description of their implementations in selected operating systems and the description of their utilization in securing typified servers. In the first chapter, the reader is introduced to basic terms and principles of computer security and access control. In the second, also theoretical part, selected access control models are described from different viewpoints, for example their factual specialization, basic rules, principles and evolution. At the end of the chapter, the models are compared to each other according to specified criteria. The third, more practically oriented chapter, continues from the initial, both general and concrete introduction with operating systems, to description of access control model implementations in selected operating systems. At the end of the chapter, these implementations too are compared according to specified criteria. The fourth, final part, is dedicated to the description of the actual securing of a web and file server using operating system level access control means. The end of the chapter is dedicated to the possibilities of using these means to secure web applications. The contribution of this thesis from the theoretical point of view is a well-arranged and compact access control model comparison, and also the merger of the theoretical base with practical use of the described model implementations. The thesis is recommended to people interested in the computer security issues in general and people interested in access control from both theoretical and practical sides, e.g. system administrators or system designers.
Zabezpečení malých internetových obchodů
Kohout, Karel ; Veber, Jaromír (advisor) ; Dvořák, Martin (referee)
The thesis describes selected security issues affecting small business e-commerce sites in the European Union and also shows whether such issues exist in authentic applications currently being used by means of a small scale study. It presents several specifics of e-commerce, a summary of European Union (European Community) law with focus on private data protection and unsolicited mail based on literature search and an overview of minimum security requirements for web-based applications. The research part contains an assessment of parts of a source code, documentation, incident response procedures and installation scripts of seven most popular PHP open-source shopping carts with regard to security derived from criteria and directives defined in the theoretical part. A limited field study of possible effects of security (or of lack thereof) on turnover is conducted and results are available at the end of the thesis.
Bezpečnost a ochrana dat v počítačových sítích malých organizací
Dohnal, Pavel Bc. ; Pokorný, Pavel (advisor) ; Jelínek, Jiří (referee)
Obecné technické, programové, organizační a personální otázky bezpečnosti počítačových sítí LAN. Bezpečnost dat - technické, programové, organizační a personální aspekty problému. Internet, internetová konektivita a bezpečnost dat (ochrana sítí, firewall - porovnání). Návrh konkrétního řešení a uspořádání sítě pro malou organizaci vycházející z výše uvedených teoretických poznatků včetně konfigurace a ekonomického hodnocení zavedení a chodu sítě.
Člověk jako klíčový prvek bezpečnosti IS
Grznár, Tomáš ; Doucek, Petr (advisor) ; Novák, Luděk (referee)
Práce se zabývá pozicí lidí v bezpečnosti informačních systémů. První část se zaměřuje na běžné uživatele a přináší rozbor toho, jaké nejčastější nebezpečí jim hrozí. Velká část je věnována představení nejčastějších typů hackerských útoků jako phishingu, sociotechnice a nebo malwaru. Čtenáři jsou pak prezentovány možné opatření, které je možné udělat, aby se dopady hackerských útoků snížily. Druhá část práce pak přináší manažerský pohled na bezpečnost lidských zdrojů. V práci jsou ukázány styčné plochy a možnosti řízení této oblasti z pohledu ITIL Security Managementu, ČSN ISO/IEC 13335 a ČSN ISO/IEC 27001. Výsledkem je pak souhrn doporučení, které může management společnosti v oblasti bezpečnosti lidských zdrojů přijmout. Opatření jsou koncipována tak, aby je bylo možné přijmout bez ohledu na to, jaká norma a nebo standard se používá k řízení bezpečnosti v podniku.
Small business computer security
Dvořák, Martin ; Doucek, Petr (advisor) ; Bébr, Richard (referee)
Tato bakalářská práce pojednává o stále aktuálnější problematice bezpečnosti informačních technologií. Cílem je provést analýzu hrozeb a rizik, které jsou pro podnikové sítě v současnosti nejvíce nebezpečné. Proto je práce zaměřena především na spam. Možnosti obrany proti spamu a nastavení podnikové sítě je ukázáno na zvolené malé firmě Orbisvideo. Na základě jednoduchého testu je prokázáno, že pouze technologie nestačí k zabezpečení počítače, ale je nutné aby samotní uživatelé dodržovali etiku chování na internetu.

National Repository of Grey Literature : 38 records found   beginprevious29 - 38  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.