National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
System for testing the robustness of communication unit LAN of remote data acquisition
Mlýnek, Petr ; Zeman, Václav (referee) ; Mišurec, Jiří (advisor)
Remote data collection systems are widely used. One of the area is also data collection in energetics, where the energy consumption can be collected daily and presented to users on-line. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the electrometers. The data transmission over the Internet can be subject of various attacks, which is the disadvantage. The understanding of attack method is the most important thing. The protection against the hackers is not complicated, but requires lot of attention. This master's thesis is focused on testing security of the communication unit LAN of remote data acquisition against attacks from the Internet. The next aim of this thesis is to describe algorithm of particular attack, needed recourses for their realization and method of their measurement and evaluation. Communication unit and component composition for attacks simulation is described in the first part of this thesis. The next part is focused on scanning for hosts and ports. The main part of this thesis is focused on the denial of service attacks and man in the middle attacks. In the end of my thesis is described selection of cryptographic system for remote data acquisition and is showed possibility of authentication mirroring. Problems of physical security are described too. The result of this thesis is script implementing all attacks, which are described.
Company policy for electronical business - credit cards
Šulc, Vladimír ; Dvořák, Jiří (advisor)
This dissertation work deals with the subject of a company in the area of e-commerce, which represents short-term or long-term plans in controlling the financial relationship toward the outer environment but also inside the company. The problem of possible abuse of credit cards is briefly analysed as well. The impulse for choosing this topic was increasing number of falsification and abusing of credit cards. When this subject is analysed in detail, the problem connected with lack of information on this particular area of crime inevitably appears. Clients of individual banking institutions often do not have even the basic knowledge about the ways their cards could be abused or misused. This is why the question of certain, at least minimal, basic information campaign done by the banks, which are supposed to protect the financial means of their clients. This dissertation work sets its goal in creating the methods of investigation of credit cards abuse not only in the Czech Republic but in the growing system of countries of Schengen Treaty and European Union. The benefit of the work can be seen in the level of theory as well of practice. The theoretical part of the work contains the analysis of the current situation of scientific knowledge in the area of information and communication technology of companies, which is implemented into information systems. Then the advantages and disadvantages connected with this kind of e-commerce are assessed and the specific opportunities for abuse of these media of payment are characterised. The problem sees mainly in writing a specialised publication, which would deal with the problem of abuse and falsification of credit cards and its possible use would be at police academies. Its main part should be the characteristics of particular forms of cards forging and also possible identification of these forgeries. This book could also help in prevention and inform clients of financial institutions about the ways of credit cards abuse. In the practical part, which concentrates on the Czech and foreign market, the author sets the basic premises for realisation of safe business of companies in the Czech Republic and its procedures. Furthermore the reasons of e-commerce abuse in the Czech Republic are analysed and results of quantification research presented. This was concentrated on ascertainment of reason of low interest in information among the public. In the conclusive part of the work the whole problem is summarised and there are also outlined perspectives and possibilities of further development
Internet Criminality
Zelinka, Petr ; Konečný,, Zdeněk (referee) ; Soukup, Tomáš (advisor)
This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of this criminality, used methods and technological equipment. In the second part of diploma thesis there are suggested possible technical and legislative precautions against internet crime.
Honey-Pot: System for Attack Detection
Michlovský, Zbyněk ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This thesis deals with the area of honeypots and honeynets. It defines their classification and contains detailed descriptions of their properties and features. It further elaborates on several freely available systems. The main focus is given to honeypot Nepethes that was being run for one month on an unfiltered Internet connection. A detailed analysis of the collected data is then given.
77 millions user accounts have been stolen, should we worry? Analysis of Internet discussions relevant to the topic
Gregor, Filip ; Švelch, Jaroslav (advisor) ; Nečas, Vlastimil (referee)
Diploma thesis 77 million PlayStation Network accounts stolen, does it affect us?: An analysis of Internet discussions revolving around this topic deals with the case of what so far seems to be the biggest case of user information leak on the Internet. The introduction outlines the history and development of PlayStation consoles and maps major attempts to jailbreak the last generation of the console by hackers. The following section presents PlayStation Network itself, whose users were at risk of the loss of their online identity because of the attack and chronologically describes the course of breach-related events including the subsequent theft of user data. It also focuses in detail on the case of GeoHot - a hacker whose dispute with Sony alienated fellow hacker community and initiated retaliatory activities which as a result led to loss of data. Another part of the thesis examines the issue of digital identity and its protection, gives an insight into the history of the formation of the hacker community and further explains the phenomenon of existence and perception of the term hacker in the context of the Internet. The final section is devoted to analysis of selected discussion posts under thematically relevant articles, analyzes them in terms of content relevance, information sentiment and...
The Influence of Cyber Terrorism Threat on the American Security Policy
Rezek, Tomáš ; Calda, Miloš (advisor) ; Mareš, Miroslav (referee) ; Cabada, Ladislav (referee) ; Polčák, Radim (referee)
(English) The aim of this dissertation is to answer the question of whether the U.S. security policy is influenced by the threat of cyber terrorism. The dissertation is divided into chapters that can be regarded as steps in a logical reasoning process. In the first chapter, cyber space is introduced and described to illustrate its importance and complexity. The next chapter analytically compares various definitions of terrorism, and partially rejects the initial hypothesis that cyber terrorism is not included in the general definition of terrorism. The following chapter statistically analyzes the available data on terrorist groups and terrorist attacks to empirically confirm the hypothesis that terrorism is still a real threat to American security. The analysis actually proves that the threat of terrorism has not decreased in relation to the number of terrorist groups. It also shows that the number of terrorist attacks against the U.S. targets has significantly decreased in the United States, while terrorist actions have been increasing constantly on a global level. The analysis shows that the success rate of terrorists attacks does not form a time series, and therefore each terrorist attack has to be examined individually to assess its success probability. The following analysis reviews the...
77 millions user accounts have been stolen, should we worry? Analysis of Internet discussions relevant to the topic
Gregor, Filip ; Švelch, Jaroslav (advisor) ; Nečas, Vlastimil (referee)
Diploma thesis 77 million PlayStation Network accounts stolen, does it affect us?: An analysis of Internet discussions revolving around this topic deals with the case of what so far seems to be the biggest case of user information leak on the Internet. The introduction outlines the history and development of PlayStation consoles and maps major attempts to jailbreak the last generation of the console by hackers. The following section presents PlayStation Network itself, whose users were at risk of the loss of their online identity because of the attack and chronologically describes the course of breach-related events including the subsequent theft of user data. It also focuses in detail on the case of GeoHot - a hacker whose dispute with Sony alienated fellow hacker community and initiated retaliatory activities which as a result led to loss of data. Another part of the thesis examines the issue of digital identity and its protection, gives an insight into the history of the formation of the hacker community and further explains the phenomenon of existence and perception of the term hacker in the context of the Internet. The final section is devoted to analysis of selected discussion posts under thematically relevant articles, analyzes them in terms of content relevance, information sentiment and...
Internet Criminality
Zelinka, Petr ; Konečný,, Zdeněk (referee) ; Soukup, Tomáš (advisor)
This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of this criminality, used methods and technological equipment. In the second part of diploma thesis there are suggested possible technical and legislative precautions against internet crime.
Honey-Pot: System for Attack Detection
Michlovský, Zbyněk ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This thesis deals with the area of honeypots and honeynets. It defines their classification and contains detailed descriptions of their properties and features. It further elaborates on several freely available systems. The main focus is given to honeypot Nepethes that was being run for one month on an unfiltered Internet connection. A detailed analysis of the collected data is then given.
Company policy for electronical business - credit cards
Šulc, Vladimír ; Dvořák, Jiří (advisor)
This dissertation work deals with the subject of a company in the area of e-commerce, which represents short-term or long-term plans in controlling the financial relationship toward the outer environment but also inside the company. The problem of possible abuse of credit cards is briefly analysed as well. The impulse for choosing this topic was increasing number of falsification and abusing of credit cards. When this subject is analysed in detail, the problem connected with lack of information on this particular area of crime inevitably appears. Clients of individual banking institutions often do not have even the basic knowledge about the ways their cards could be abused or misused. This is why the question of certain, at least minimal, basic information campaign done by the banks, which are supposed to protect the financial means of their clients. This dissertation work sets its goal in creating the methods of investigation of credit cards abuse not only in the Czech Republic but in the growing system of countries of Schengen Treaty and European Union. The benefit of the work can be seen in the level of theory as well of practice. The theoretical part of the work contains the analysis of the current situation of scientific knowledge in the area of information and communication technology of companies, which is implemented into information systems. Then the advantages and disadvantages connected with this kind of e-commerce are assessed and the specific opportunities for abuse of these media of payment are characterised. The problem sees mainly in writing a specialised publication, which would deal with the problem of abuse and falsification of credit cards and its possible use would be at police academies. Its main part should be the characteristics of particular forms of cards forging and also possible identification of these forgeries. This book could also help in prevention and inform clients of financial institutions about the ways of credit cards abuse. In the practical part, which concentrates on the Czech and foreign market, the author sets the basic premises for realisation of safe business of companies in the Czech Republic and its procedures. Furthermore the reasons of e-commerce abuse in the Czech Republic are analysed and results of quantification research presented. This was concentrated on ascertainment of reason of low interest in information among the public. In the conclusive part of the work the whole problem is summarised and there are also outlined perspectives and possibilities of further development

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.