National Repository of Grey Literature 33 records found  beginprevious24 - 33  jump to record: Search took 0.01 seconds. 
Security policyes of SELinux for selected application in Gnome environment
Sládek, Michael ; Palovský, Radomír (advisor) ; Vadinský, Ondřej (referee)
The goal of this work is creation of SELinux security policy for selected application. To achieve this goal is this work divided to several parts. The first part is presentation of basic security principles, on which SELinux is based and then presentation of structure of the SELinux itself. The second part is analysis of the degree of support of SELinux in some selected, user favorite, distributions of Linux. In the last part is, on the specific application, presented process of creation of SELinux security policy. Specifically, remaking of document browser Evince into secure browser of untrusted documents. The contribution of this work is to create a working policy for application Evince for GNOME user environment and mapping the extent of SELinux support in selected Linux distributions.
Bezpečnost a ochrana soukromí v informační době
Suda, Jiří
The thesis is focused on personal computer security from the perspective of an ordinary user. This text in the theoretical part mainly introduces the reader to the most common risks associated with the use of a personal computer connected to the Internet. In the practical part based on the collected knowledge was created application used to configure and secure operating system Ubuntu.
Computer Crime and Czech Republic
Glykner, Martin ; Sigmund, Tomáš (advisor) ; Zavrtálek, Jan (referee)
This bachelor thesis deals with computer crime in Czech Republic considering the legal point of view. It makes the reader familiar with development of cyber crime in the world and especially in Czech Republic. It deeply describes czech legal framework of fighting computer crime and its international context. This description contains examples of particular crimes and articles of law that apply to them. The paper also describes institutions that are engaged in combating this crime. Afterwards problems complicating the fight against cybercrime are found and solutions leading to their removal are proposed.
Penetration testing of servers
Vovesný, Martin ; Pavlíček, Luboš (advisor) ; Bykadorov, Andrej (referee)
This thesis is focused on the security rating dilemma of computer defense with the help of penetration testing tools. The author's goal is to test company's specific servers and evaluate their security in the view of potential network attacks. Furthermore, during the penetration testing the author is using already known and secure methods. He uses this methodology with these tools which have demonstrated practical usability.
Computer accounting
Guzý, Ladislav ; Ďurianová, Gabriela (advisor)
The first part of the bachelor thesis acquaints the reader with the history of bookkeeping, description of the typical signs of accounting maintained on the computer, which forms the main part of this thesis, the legal specification of computer accounting, computer security and archiving of accounting documents. The second part deals with different types of computer programs and their specifics in practice.
Computer Security and Education of Informatics
Brechlerová, Dagmar
This paper describes problem of computer security education. It is necessary to include computer security to informatics educytion for medical students, too.
Operating Systems' Resource Access Control Models
Vopička, Adam ; Pavlíček, Luboš (advisor) ; Palovský, Radomír (referee)
The thesis deals with models used in access control to operating systems' resources. The thesis' goals are the theoretical description of these models and their comparison, the description of their implementations in selected operating systems and the description of their utilization in securing typified servers. In the first chapter, the reader is introduced to basic terms and principles of computer security and access control. In the second, also theoretical part, selected access control models are described from different viewpoints, for example their factual specialization, basic rules, principles and evolution. At the end of the chapter, the models are compared to each other according to specified criteria. The third, more practically oriented chapter, continues from the initial, both general and concrete introduction with operating systems, to description of access control model implementations in selected operating systems. At the end of the chapter, these implementations too are compared according to specified criteria. The fourth, final part, is dedicated to the description of the actual securing of a web and file server using operating system level access control means. The end of the chapter is dedicated to the possibilities of using these means to secure web applications. The contribution of this thesis from the theoretical point of view is a well-arranged and compact access control model comparison, and also the merger of the theoretical base with practical use of the described model implementations. The thesis is recommended to people interested in the computer security issues in general and people interested in access control from both theoretical and practical sides, e.g. system administrators or system designers.
Bezpečnost a ochrana dat v počítačových sítích malých organizací
Dohnal, Pavel Bc. ; Pokorný, Pavel (advisor) ; Jelínek, Jiří (referee)
Obecné technické, programové, organizační a personální otázky bezpečnosti počítačových sítí LAN. Bezpečnost dat - technické, programové, organizační a personální aspekty problému. Internet, internetová konektivita a bezpečnost dat (ochrana sítí, firewall - porovnání). Návrh konkrétního řešení a uspořádání sítě pro malou organizaci vycházející z výše uvedených teoretických poznatků včetně konfigurace a ekonomického hodnocení zavedení a chodu sítě.
Člověk jako klíčový prvek bezpečnosti IS
Grznár, Tomáš ; Doucek, Petr (advisor) ; Novák, Luděk (referee)
Práce se zabývá pozicí lidí v bezpečnosti informačních systémů. První část se zaměřuje na běžné uživatele a přináší rozbor toho, jaké nejčastější nebezpečí jim hrozí. Velká část je věnována představení nejčastějších typů hackerských útoků jako phishingu, sociotechnice a nebo malwaru. Čtenáři jsou pak prezentovány možné opatření, které je možné udělat, aby se dopady hackerských útoků snížily. Druhá část práce pak přináší manažerský pohled na bezpečnost lidských zdrojů. V práci jsou ukázány styčné plochy a možnosti řízení této oblasti z pohledu ITIL Security Managementu, ČSN ISO/IEC 13335 a ČSN ISO/IEC 27001. Výsledkem je pak souhrn doporučení, které může management společnosti v oblasti bezpečnosti lidských zdrojů přijmout. Opatření jsou koncipována tak, aby je bylo možné přijmout bez ohledu na to, jaká norma a nebo standard se používá k řízení bezpečnosti v podniku.
Small business computer security
Dvořák, Martin ; Doucek, Petr (advisor) ; Bébr, Richard (referee)
Tato bakalářská práce pojednává o stále aktuálnější problematice bezpečnosti informačních technologií. Cílem je provést analýzu hrozeb a rizik, které jsou pro podnikové sítě v současnosti nejvíce nebezpečné. Proto je práce zaměřena především na spam. Možnosti obrany proti spamu a nastavení podnikové sítě je ukázáno na zvolené malé firmě Orbisvideo. Na základě jednoduchého testu je prokázáno, že pouze technologie nestačí k zabezpečení počítače, ale je nutné aby samotní uživatelé dodržovali etiku chování na internetu.

National Repository of Grey Literature : 33 records found   beginprevious24 - 33  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.