National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Digital Forensics of the Hybrid Cloud Environment
Krčálová, Anna ; Koutenský, Michal (referee) ; Ryšavý, Ondřej (advisor)
The bachelor thesis deals with the digital forensic analysis of the hybrid cloud in the combination of Google Cloud and Nextcloud. Several examples of events in the solution of which analysis would be appropriate are detailed in the thesis, from the initial identification of the problem, through the retention of data, to the forensic analysis and its output. The work also includes a shortened procedure for setting up the hybrid cloud and logging.
Network attached storages
Laciný, Jakub ; Vokoun, Tomáš (advisor) ; Pavlík, Jan (referee)
Bachelor thesis follows up the possibilities of using NAS in small companies and households. Theoretical part is devoted to the definition of basic concepts, introduction of device, analysis of basic and extending functions. It focuses primaly on analysis of suported comunication protocols, commonly used file systems and principles of function disk arrays. One section is dedicated to data backup and NAS server protection, marginally to wireless security, which is closely related with the theme, especially in terms of data misuse. In practical part, the basic services and setings are described at the first. In further steps, the applications and functions are introduced for their subsequent use as common user as small company.
Online Password Manager
Ort, Štěpán ; Buchalcevová, Alena (advisor) ; Mészáros, Jan (referee)
The objective of this thesis is to show on which principles a modern password manager works. The introductory theoretical part describes cryptographic algorithms and evaluates whether they are suitable for use in current applications. At the same time it presents methods how to create a password which is strong and also easily remembered. The second part explains the key characteristics of a password manager. The last chapter illustrates the architecture of online password storage and the way of communicating with the password manager. Measures that have to be taken in order to make such storage secure are also described here.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.