National Repository of Grey Literature 34 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
The laboratory exercise for demonstrating social engineering
Kuželová, Marie ; Gerlich, Tomáš (referee) ; Lieskovan, Tomáš (advisor)
The aim of the bachelor's thesis is to raise awareness of social engineering practices and its methods for obtaining user data. In the theoretical part, the reader is introduced to current threats, the concept of social engineering itself, its methods and the description of the attack are also defined. These techniques often lead to the spread of malicious software, which is why the work also focuses on its definition and division into individual types. In the practical part, the work focuses on the creation of a scenario for the demonstration of social engineering in the BUTCA environment. The individual subsections describe eight tasks that focus on spoofing, pretexting, identity theft, phishing, fraudulent behavior, and baiting. They contain a description and the process of their creation. An integral part is the overall testing of this laboratory task by primary and secondary school students, therefore the thesis deals with its output at the end.
Email client for seniors
Vala, Robin ; Sláčik, Ján (referee) ; Komosný, Dan (advisor)
The bachelor thesis focuses on the design and development of an e-mail client that is adapted to the needs of seniors aged 90 years and older. The main goal was to create a user-friendly interface that minimizes complexity and includes only the necessary features relevant to this target group of people. In addition, audio assistance was integrated into the application, which significantly facilitates navigation in the program environment and improves the overall user experience. As part of the application’s security, a special feature has been implemented to warn users of the potential dangers associated with links leading to fraudulent websites contained in received email messages. This measure helps to protect users from online threats and scams. The complete source code of this thesis is freely available in the Github repository.
Phishing campaign design
Duong, Tuan Hung ; Michal,, TRTIL (referee) ; Ondrák, Viktor (advisor)
The thesis deals with implementing a tool to design and simulate phishing attacks. The first part of the thesis focuses on the history of phishing, phishing strategies, forms of attacks, and an analysis of previous incidents in the real world. Using the open-source phishing framework GoPhish, a phishing e-mail will be created. The design of the phishing e-mail will be based on the analysis of real phishing e-mails.
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
Increasing security awareness in the company
Novák, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The master’s thesis is focused on increasing security awareness in the company. The first chapter contains the theoretical background, which is necessary for creating a security education system. The second chapter deals with the analysis of the current situation, which is needed for determinating the need to increase security awareness. The third and last chapter contains the design of the education system itself.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.
??Návrh softwarových nástrojů pro využití v oblasti prevence sociálního inženýrství v prostředí vysoké školy?
Procházka, Tomáš
This bachelor’s thesis focuses on the topic of social engineering within a university environment. Its content includes the selection, implementation, and deployment of a software solution for the purpose of testing selected social engineering techniques in the university environment. The thesis also addresses the evaluation of the test results.
Non-security of the Czech Army's soldiers on social networks
Kulhánek, Jan ; Ludvík, Jan (advisor) ; Kučera, Tomáš (referee)
The aim of this thesis is to examine the risk of the Czech Army not being properly secure on social networks, the behaviour of its uniformed members and their positive identification of social networking sites. The Russian aggression in the Ukraine and the hacking of Czech medical facilities have once again brought up the importance of cybersecurity and the role that it plays in the modern world, with the human factor being positively identified as the weakest link in security. This case study seeks to define the ideal types of soldier behaviour on social media and to analyse the potential risks that each type poses. To this end, this thesis first presents information necessary to fully understand the vast topic of cybersecurity on social media. Next, it defines several ideal types and their building blocks, in order to categorize the social media accounts of soldiers it later analyses. The author concludes that each defined ideal type has inherently problematic behaviours associated with it and carries with it a level of risk for the Army of the Czech Republic. However, the present user and family member ideal types were found to be the riskiest. Key words OSINT, SOCMINT, NATO, Czech Armed Forces, Cybersecurity, Security, Social media, Ideal type analysis, Social engineering Title The insecurity...

National Repository of Grey Literature : 34 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.