National Repository of Grey Literature 153 records found  beginprevious144 - 153  jump to record: Search took 0.02 seconds. 
Malware - threats and countermeasures
Hejduk, Jakub ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor's thesis addresses the issue of a threat in the area of computers and internet networks, malware. It defines what malware is, its various types and the history in terms of occurrence and actions. It also provides the reader with insight into malware's functionality and how it threatens users. Furthermore, the thesis contains examples of some current well-known threats. A dossier on antivirus and antispyware software is also included. It is essentially a summary of their functions, properties, benchmark results and a list of countermeasures it equips the user with. The last section of the theoretical part of the thesis is a prediction of the future regarding the evolution of these threats and how will they affect the user. A considerable part of this work is a survey providing a summary of the current level of malware knowledge among people. I intend to determine if people are aware of these threats, their ability to defend themselves against them and also whether they already encountered this issue and if so, how did they handle it. This thesis should increase awareness about malware to make people understand what it is capable of in the environment of an unsecured computer. Ultimately, I am going to present the results of the survey and evaluate the depths of knowledge about malware among people.
Malware analysis and reverse engineering
Šváb, Martin ; Čermák, Igor (advisor) ; Hlaváč, Jindřich (referee)
Focus of this thesis is reverse engineering in information technology closely linked with the malware analysis. It explains fundamentals of IA-32 processors architecture and basics of operating system Microsoft Windows. Main part of this thesis is dedicated to the malware analysis, including description of creating a tool for simplification of static part of the analysis. In Conclusion various approaches to the malware analysis, which were described in previous part of the thesis, are practically demonstrated on unknown malware sample.
Virtual environment for behavioral analysis of malware
KOVÁŘ, Jaroslav
The goal of this bachelor thesis was to propose and implement a virtual environment for behavioral analysis of malware. Specifically with simulated network services. Subsequently was this environment applied to the analysis of several selected malware samples.
The analysis of discussion forums helping users with infected computer
Labant, Patrik ; Pavlíček, Luboš (advisor) ; Bruckner, Tomáš (referee)
This work is focused on discussion forums, when they are viewed as a means (one of the methods) for malware removing from computers. In the theoretical section, the assumptions and actions that precede to the successful removal of malware from a computer are firstly described. It is based on adequate knowledge of users about computers, when there is a list of options, mentioned in the text, where users can acquire this knowledge. Next, this section describes the symptoms of strange computer behavior that may be caused by malware. It is followed by characteristics of selected types of malware and list of options where users can solve their problems with infected computer. At the end of theoretical part is a list of preventive measures to prevent infection of computer by malware. The practical part is mainly devoted to the analysis of discussion forums, where the common characteristics of the majority forums are firstly described, and subsequently three forums are selected and analyzed in detail, based on the list of common characteristics with a focus on mentors (moderators) on this forums, their activities and qualifications, and focused on the procedures for dealing with malware infected computer.
The issue of malware, its risks and impacts on society
Sakař, Václav ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals with the problem of malware, the problem is a viruses, worms, trojan horses and other computer "vermin". This is a topic that cannot be overlook and which, in today's society, that takes full advantage of internet capabilities, is important. At the beginning of the work is shown the evolution of malware from its beginning until today, together with the forecasted development for the future. There are also shown and described various known types of malware and segments that are most vulnerable malware. At the end of the first part of this work is told how to defend against malware, whether in the field of prevention, protection, or direct the removal of malware itself in case of "infected". In the second, already practically oriented part of the work is done comparing the selected products to protect against malware by me selected and defined criteria and their weights in order to select the best product. At the end of this part the survey is performed to determine what is the awareness about this issue among people. Then it is evaluated and its components will be further described and commented. The contribution of this bachelor thesis is to clarify the issue, describe appropriate protection against malware (along with selecting a suitable product) and determine the level of awareness of this issue among the people.
Cyber crime in the Slovak republic
Kalinová, Diana ; Sigmund, Tomáš (advisor) ; Toman, Prokop (referee)
The Bachelor thesis focuses on cyber crime in the Slovak republic, as a new kind of criminality that is associated with computers and modern technologies as well as a problem, which must be addressed. It explains the concept of cyber crime, its divisions and problems that are associated whit it. It seeks to bring selected types of crime, how they work in practice and used instruments. It briefly reflects the history of computer crime. The next part of the Bachelor mentions in chronological order the most serious cases, which occurred in the history of Slovak cyber crime. It appoints and describes the institutions, laws and prevention programs, which dealing with this issue in Slovakia. The main part of Bachelor thesis is the search for foreign legislative changes, which should be positive and negative examples for Slovakia. On the basis of all obtained information listed in the thesis, assess the situation in the Slovak republic and propose possible solution.
Possible ways to gain information about internet users.
Ross, Richard ; Měsíček, Libor (advisor) ; Molnár, Zdeněk (referee)
This thesis is aimed on internet security, gaining the anonymity and creating a guide to increase self defense of internet users. The goal of this paper is to describe the types of cyber attacks that can be done on internet users and to describe circular flow of information about users on internet and its use by third parties. Additional goal is to design the ways of reaching the anonymity on internet and to provide a guide to increase a self defense of the users. This thesis gradually describes creation of internet, world-wide-web and web standards, which is important for understanding the vulnerability of today's internet. Thesis is complemented by enumeration of relevant protocols of ISO/OSI model, which has share on user's everyday communication. Next part pass to attacks itself both technical based (e.g. Man-In-The-Middle) and social based (e.g. Phishing). This paper also aims on collecting the data of internet users by third parties and on the ways how to prevent it and reach the anonymity on the internet. End of this paper belongs to the list of security steps for standard internet users, by which they will be able to minimize the risk to minimum. Final chapter presents online blog that was created to enhance awareness of internet users.
Security and protection of the data on Faculty of Management VSE
Deml, Michal ; Pokorný, Pavel (advisor) ; Štrobl, David (referee)
The bachelor thesis describes the possible threats that may jeopardise the data of the common user. It describes the threats in the form of the unwanted software, targeted attack or as result of natural disaster. At the same time it describes how user may protect his data against lost and these above mentioned threats. In other chapters the thesis concerns about the riskiness of the behavior of the user and way of software and hardware protection of data on the Faculty of Management of VŠE. Based on information obtained by these tests the thesis defines the main security gaps in system of the Faculty of Management.
The use of honeypots in the school network
Osmík, Lukáš ; Pavlíček, Luboš (advisor) ; Beneš, Jiří (referee)
The thesis deals with issues of honeypots. The first section explains what honeypots are and their use. Next I focus on their classification according the different aspects. Then I describe the advantages and disadvantages of these tools. Besides there are described some specific solutions. The last chapter of theoretical part summarizes the projects dealing with this issue. The second part of this work deals with the deployment of honeypots inside the school's network. In this part I describe a configuration of specific solutions. Then there are summarized the results of the data collected by honeypots and the last chapter describes how these data could be used at school.
History of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007.
SUFČÁK, Pavel
The subject of this bachelor?s work is a history of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007. The goal of this bachelor?s work is performance of analysis of the development of personal data protection in the time period from the year 1990 until the year 2007 with special emphasis on everyday work and practise of police organisms and police bodies within Management of the South Bohemia Region, POLICE of the CZECH REPUBLIC. Next successive goal of this bachelor?s work is the performance of analysis of the development of computer technology applied and used in police practice (safeguarding, protection, operation, back-up and archiving, anti-virus protection, case reporting). Theoretical part of this bachelor?s work deals with and analyses the concept of privacy, the development of the right of privacy, the development of the right to protection of personal data in terms of global, European, the Czech Republic, public-law, criminal-law and police. This bachelor?s points out the possibility of various types of imminent danger in the area of data funds being exposed to danger while using the most important relevant methods of cybernetics and cybernality. The integral part of this bachelor?s work is performance of quantitative analysis of the development of occurrence and incidence of criminal acts according to § 178 Unlawful/wrongful treatment of personal data, §§ 239, 240 Breach of secrecy of delivered messages, § 257a Damage and misuse/ill-use of a record on information carrier, arising out of the ESSK (Monitoring, Evidence Statistical System of Criminality) information system, which is run by the Centre (Headquarter Centre) of Informatics and Analytical Processes of the Service of Criminal Investigation Police Headquarters of the Czech Republic in the time period from the year 1990 until the year 2007. The second analysis assesses and evaluates the level of activities of appointed/ authorized policemen, who on the basis of the Act On Police of the Czech Republic perform direct supervision and inspection regarding observance of legislative standards of both having their basis in laws and falling and being obligatory within the Ministry of Interior under the conditions of Police Force in the Czech Republic, including pointing out the most frequent slight mistakes.

National Repository of Grey Literature : 153 records found   beginprevious144 - 153  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.