National Repository of Grey Literature 17 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
The problem of cyber security in the EU industrial environment
Zauana, Magdalena ; Kovář, Jiří (referee) ; Maradová, Karla (advisor)
Práce představí důkladnou analýzu současných strategií kybernetické bezpečnosti přijatých agenturou ENISA, která je zodpovědná za zvyšování kybernetické bezpečnosti v EU. Analýza dále identifikuje nedostatky v implementaci přijatých strategií a osvětlí perspektivní možnosti optimalizace účinnosti agentury ENISA při zvyšování kybernetické bezpečnosti. Současně bude také zkoumat účinnost právních předpisů EU, evropských a mezinárodních norem, jejichž cílem je poskytnout cenný rámec pro organizace, které chtějí zlepšit svou kybernetickou bezpečnost. Kromě toho dokument navrhne opatření pro prevenci a obnovu kybernetické kriminality, která zvýší informovanost všech jednotlivců a organizací vystavených digitálnímu světu, aby se lépe chránili před kybernetickými útoky. To bude tvořit součást celkové analýzy IT rizik, která v konečném důsledku posílí technologická bezpečnostní opatření prostřednictvím metody FMEA. Nakonec bude proveden experiment, při němž bude počítač záměrně infikován malwarem nebo ransomwarem, přičemž budou popsána důkladná preventivní a detekční opatření k předcházení útokům a bude také navržen plán obnovy po útoku. Závěrem je konstatováno, že řešení problému kybernetické bezpečnosti v průmyslovém prostředí EU vyžaduje komplexní a koordinovaný přístup, který zahrnuje spolupráci všech zúčastněných stran. Na podporu argumentů použitých v této studii jsou zahrnuty i poznatky předchozích výzkumníků.
Cybersecurity analysis of hybrid photovoltaic systems for single-family homes
Svoboda, Vojtěch ; Kohout, David (referee) ; Mikulášek, Michal (advisor)
The bachelor thesis deals with analysis of the cybersecurity of photovoltaic systems for single-family houses. The aim of the thesis was to introduce hybrid photovoltaic systems, possible cyber attacks on these systems and to perform a sample attack on a PV system. The thesis consists of a theoretical and a practical part. The bachelor thesis contains four chapters. The first and second chapters describe the concepts related to cyber attacks and PV systems. Chapter three deals with the Solax X3-Hybrid inverter, its characteristics, vulnerabilities and the communication protocols used. The fourth chapter includes testing of the LAN and Wi-Fi dongles through which the inverter communicates.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Cyber Attacks in JMeter
Klimeš, Jan ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The main aim is to create extension modules for application JMeter that add features to the software generate DoS attacks, SYN flood, UDP flood, DNS Server attack and DNS Amplification using applications Trafgen. The theoretical part generally describes cyber attacks, associated with network protocols and application JMeter itself. The practical part contains a description of the graphical interface of the expansion modules, each class which the modules consist of and test results.
Cyber Attacks
Zmeškal, Jiří ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Theoretical part of this thesis is dedicated to describing basic terms of network communication. Usage of network communication has become a necessity and is used on daily basis for a number of purposes, starting with communication between people, going across internet shopping and banking all the way to remote controlling industrial machinery. Another theoretically described topic is how attackers abuse attributes and shortcomings of communication protocols in order to commit illegal activities, specifically denial of service type of attacks. Finally, theoretical part includes a list of found open source applications capable of launching such attacks. Practical part describes development of application, capable of launching two selected forms of attack. These attacks are HTTP GET Flood, based on sending massive amounts of GET request, and Slow HTTP GET, based on imitating a user with slow internet connection. The development is described step by step and includes multithread processing, used publicly available components (Boost library for example) and challenges encountered during development (such as library limitations and cross platform compatibility).
Simulating information security management within a university environment
Hložanka, Filip ; Martina,, Chitu (referee) ; Sedlák, Petr (advisor)
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network using a sophisticated cybernetic polygon. The security of the network is then assessed after several iterations of the simulations. Its parameters are adjusted in the effort to increase its security and the module is tested on an academic employee in order to assess its effectiveness. The conclusion evaluates the possibilities of increasing the security of the simulated network as well as the usability of the cybernetic polygon in practice.
Vulnerability testing of cloud solutions by Slowloris attack
Šrámek, Michal ; Sikora, Marek (referee) ; Šeda, Pavel (advisor)
This bachelor's thesis addresses the issue of distributed Slowloris attack implemented in the Apache JMeter module. This module is then used to demonstrate the vulnerability in the Microsoft Azure cloud environment. The outcome of the thesis is an extension of the module, enabling testing from multiple IP addresses. The SlowHTTPTest tool, which the module utilizes for the attack, is also modified. In the introduction, the basic concepts related to cloud services and their classification are established. This is followed by chapters defining the current security threats to the cloud and how they compare between the three largest cloud providers. The technologies and configurations used in Azure environments are also described. Finally, the thesis focuses on modifying the attack module to support multiple addresses and tests it on both local and cloud infrastructures.
Moving Toward Strategic Cyber War Theory? Analysis of Russian State-backed Cyber Attacks
Green, Joshua ; Erkomaishvili, David (advisor) ; Landovský, Jakub (referee)
This thesis analysed cyber-attacks conducted by two pairs of nation states (Russia/Ukraine and Iran/Israel) against each other, through the lens of Jan Kallberg's Strategic Cyberwar Theory in order to determine if elements of the theory are being applied and if so, how they are being applied. This thesis also attempts to give insights as to whether this represents a shift towards the Strategic Cyber War Theory becoming a practical reality. The thesis finds that elements of Kallberg's theory are clearly visible, to varying degrees, in the offensive campaigns conducted by all the nation states studied. Each nation state employed a different strategy in terms of which pillars of society and organisations were targeted. All the evidence points towards cyber-attacks becoming a more important tool for nation states pursuing their political and strategic goals. However, the notion of the Strategic Cyber War Theory becoming a reality is far more uncertain, with other tools likely to remain more important, particularly during wartime (such as the traditional branches of military service). If a level of technological sophistication can be reached where cyber-attacks can be conducted which have the disruptive capabilities of the NotPetya cyber-attack seen in 2017 but are able to be maintained over a...
Crime of Aggression under the Rome Statute of International Criminal Court
Voženílková, Tereza ; Lipovský, Milan (advisor) ; Flídrová, Eliška (referee)
1 Crime of Aggression under the Rome Statute of International Criminal Court, abstract Recent events in the world show that cyber-attacks can constitute one of the greatest threats to international peace and security. Cyber operations occurring in cyberspace present unique challenges to the international community beyond the scope of existing international law. While there is a consensus that international law should apply to cyberspace, perspectives on the qualification of cyber-attacks as the most serious crimes falling under the jurisdiction of the International Criminal Court remain divided. This paper discusses the definition of the crime of aggression under the jurisdiction of the International Criminal Court with a special focus on cyber-attacks. The aim of this paper is to answer the question whether cyber-attacks can be considered a crime of aggression under the Rome Statute. The first chapter discusses the historical development and the rather complicated process of adopting the definition of the crime of aggression over the years. The second chapter describes the various elements of the crime of aggression and the jurisdiction of the International Criminal Court and the Security Council over this crime. The definition of cyber- attacks and their difference from conventional attacks is discussed...
The Potential of Cyber Threats in the Critical Energy Infrastructure
Starý, Jan ; Schmidt, Nikola (advisor) ; Karásek, Tomáš (referee)
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy infrastructure. Main emphasis is put on the concept of smart grids as possible solution of decentralization. In these terms technical means of security are studied especially with emphasis on SCADA (Supervisory Control And Data Acquisition) systems and the Internet as one of the essential component of communication in modern communication technologies.

National Repository of Grey Literature : 17 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.