National Repository of Grey Literature 31 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
Increasing security awareness in the company
Novák, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The master’s thesis is focused on increasing security awareness in the company. The first chapter contains the theoretical background, which is necessary for creating a security education system. The second chapter deals with the analysis of the current situation, which is needed for determinating the need to increase security awareness. The third and last chapter contains the design of the education system itself.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.
??Návrh softwarových nástrojů pro využití v oblasti prevence sociálního inženýrství v prostředí vysoké školy?
Procházka, Tomáš
This bachelor’s thesis focuses on the topic of social engineering within a university environment. Its content includes the selection, implementation, and deployment of a software solution for the purpose of testing selected social engineering techniques in the university environment. The thesis also addresses the evaluation of the test results.
Non-security of the Czech Army's soldiers on social networks
Kulhánek, Jan ; Ludvík, Jan (advisor) ; Kučera, Tomáš (referee)
The aim of this thesis is to examine the risk of the Czech Army not being properly secure on social networks, the behaviour of its uniformed members and their positive identification of social networking sites. The Russian aggression in the Ukraine and the hacking of Czech medical facilities have once again brought up the importance of cybersecurity and the role that it plays in the modern world, with the human factor being positively identified as the weakest link in security. This case study seeks to define the ideal types of soldier behaviour on social media and to analyse the potential risks that each type poses. To this end, this thesis first presents information necessary to fully understand the vast topic of cybersecurity on social media. Next, it defines several ideal types and their building blocks, in order to categorize the social media accounts of soldiers it later analyses. The author concludes that each defined ideal type has inherently problematic behaviours associated with it and carries with it a level of risk for the Army of the Czech Republic. However, the present user and family member ideal types were found to be the riskiest. Key words OSINT, SOCMINT, NATO, Czech Armed Forces, Cybersecurity, Security, Social media, Ideal type analysis, Social engineering Title The insecurity...
Application for cloning websites for security testing
Kubíčková, Dita ; Sikora, Marek (referee) ; Martinásek, Zdeněk (advisor)
The master thesis is focused on developing application for website cloning that could be used in phishing campaign during security testing. The theoretical part describes social engineering with emphasis on phishing. It also introduces phishing campaigns steps’ and attack framework. Then, it compares currently used tools for website cloning and evaluates their shortcomings. The practical part deals with development of the application in Python using Web Driver and provides the results of application testing in comparison to GoPhish which is often used for website cloning.
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Návrh marketingové a obchodní strategie pro začínající startup v oblasti prodeje IT služeb
Vošmerová, Lucie
Vošmerová, L. Marketing and business strategy for IT services sale start up. Bachelor thesis. Brno: Mendel University, 2020. The bachelor thesis is focused on an IT services sale start up. For this start up is created marketing and business strategy. The strategy is based on situation analysis which includes a market environment and primary and secondary data. The questionnaire is also a part of the bachelor thesis. Because of segmentation, targeting, positioning and found information is created marketing and business strategy using marketing mix. The target of the strategy is raised public awareness of start up’s services.

National Repository of Grey Literature : 31 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.