National Repository of Grey Literature 76 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Impact of IIoT security on proactive maintenance of company's assets
Chomyšyn, Maxim ; Vladimír,, Türkon (referee) ; Sedlák, Petr (advisor)
This work examines possible safety risks associated with the operation of IIoT technologies in industrial production. The content of this document is an analysis of used IIoT technologies, their purpose and method of implementation into production processes and the company's technology strategy. The outcome of this analysis will serve to develop possible risk scenarios and their associated impacts. Finally, I recommend possible changes that either eliminate these risks completely or at least minimize them.
Hacktivism: Politics, Crime, or Fun?
Raška, Jindřich ; Froehling, Kenneth (referee) ; Kotásek, Miroslav (advisor)
Cílem této bakalářské práce je zanalyzovat fenomén zvaný hacktivismus, jeho význam, dopady na společnost a motivaci jeho aktérů. Termín hacktivismus se skládá ze dvou následujících termínů; aktivismus, který bývá ve většině případů politicky motivovaný a hacking, jenž se jedná o kriminální činnost za účelem zneužití chyby nebo nedokonalosti výpočetního systému. Za účelem efektivního dosažení svého cíle, se aktéři hacktivismu, stejně jako jiní aktivisté, většinou organizují do skupin. Práce je též zaměřena na motivaci a následky konání těchto organizovaných skupin, zejména na skupinu s názvem Anonymous, s exemplárními příklady jejich akcí z minulosti.
Integration of advanced artificial intelligence methods with log management security systems
Sedláček, Jiří ; Mikulec, Marek (referee) ; Safonov, Yehor (advisor)
Cyber security is a very important aspect of everyone’s daily life. With the ever-expanding cyberspace and its growing influence on the real world, the issue of cyber security is all the more important. The theoretical part of the thesis describes the basic aspects of security monitoring. Also, the process of collecting event logs and their management is briefly described. An important means of security monitoring is the management of security information and events. Its advantages, disadvantages and possible improvements with artificial intelligence are discussed. Security orchestration, automation and response functions are also mentioned in the theoretical part. Machine learning techniques such as neural networks and deep learning are also mentioned. This section also focuses on cyber operations centres in terms of improving the efficiency of human ”manual” labour. A survey of possible machine learning techniques for this use case has been conducted, as the lack of human resources is a critical issue within security operations centres. The practical part of the thesis involves setting out a goal (text sequence classification) that could make the work considerably easier in terms of manually categorizing event logs according to their source. For this set task, security monitoring related data was collected from different log sources. In the practical part, the methods for processing this data are also described in detail. Subsequently, a suitable neural network model was selected and its technical description was performed. Finally, the final data processing and the process of training, validating and testing the model are described. Three scenarios were developed for this process, which are then described in detail in the measurement results.
Cyber security testing in an environment of operational technology
Kuna, Erik ; Pospíšil, Ondřej (referee) ; Paučo, Daniel (advisor)
The topic of this work is security testing in connection with operational technology networks. The theoretical part covers description of operational technology, analysis of the current state of security in such networks and the methodology for penetration testing in this context. A section is devoted to protocols relating to said networks, comprising their characteristics, comparison of the same and related advantages and disadvantages. The theoretical part aids comprehension of the practical section, which details design and implementation of a suitable environment for testing and performing security in ICS/SCADA. Therein, emphasis is placed on security issues that pertain to the ModBus protocol.
Automation of a Red Team in KYPO cyber range
Boháček, Milan ; Drašar Martin, RNDr. Ph.D (referee) ; Sedlák, Petr (advisor)
Tato diplomová práce zkoumá možnost automatizace činností červeného týmu při tréninku v kybernetické aréně. Práce obsahuje zhodnocení současného stavu v oblasti automatizace červeného týmu a penetračního testování a následně představení nástroje, který lze využít právě pro automatizaci činností červeného týmu při cvičeních kybernetické bezpečnosti.
5G network – how will it change our lives?
Ondriska, Josef ; Rujbrová, Šárka (referee) ; Jašková, Jana (advisor)
Tato bakalářská práce popisuje koncept páté generace bezdrátových systémů a diskutuje její hlavní přínosy i rizika. Práce uvádí stručný přehled vývoje mobilních komunikačních sítí. Popisuje funkci každé generace a uvádí její vlastnosti. Dále popisuje koncept 5G sítě, uvádí její parametry a klíčové faktory, které vedly k jejímu vzniku. V další části se práce věnuje internetu věcí, uvádí jeho historii a možné uplatnění společně se sítěmi 5G. Jmenuje nejrůznější oblasti využití a definuje, jak bude společnost z této technologie těžit. Závěrem se práce zabývá možnými hrozbami, ať už jde o lživé informace, nebo skutečná rizika jako jsou negativní dopady na lidské zdraví či bezpečnost s ohledem na osobní vlastnictví.
DYNAMIC BIOMETRIC SIGNATURE AS AN EFFICIENT TOOL FOR INTERNAL CORPORATE COMMUNICATION
Hortai, František ; Jašek, Roman (referee) ; Dočkal, Jaroslav (referee) ; Dostál, Petr (referee) ; Smejkal, Vladimír (advisor)
The aim of this thesis is to provide comprehensive information on the possibilities of authentication, combination of authentication factors and the integration of this issue into corporate communication. The work focuses on this issue and specifies the possibilities for obtaining authentication information, analyses the authentication methods, identification and authorization. It examines the applicability of biometric technologies, the principle of their functionality, examples of their use, their impact, the advantages and disadvantages they bring. A natural, easy-to-use, convenient tool for effective and secure communication is authentication including the dynamic biometric signature. The issues of the dynamic biometric signature technology and its implementation are examined from a comprehensive perspective involving experiments. The research proved that the dynamic biometric signature can serve as a method for supporting secure corporate communication and reduce authentication risks in companies and for individuals.
Penetration test of camera system
Slaný, Radek ; Martinásek, Zdeněk (referee) ; Paučo, Daniel (advisor)
This bachelor thesis is dedicated to penetration testing of camera system ADEROS. Virtualized testing enviroment was created for purposes of penetration testing. This enviroment was reachable via VPN. In the first part of the practical part was performed scanning of the camera system. In the second part of the practical part was selected a methodology according to results from the first part. In this part is also described process of the penetration testing of the camera system as well as process of stress testing of the web interface. In third part of practical part were results of penetration testing processed into report. Main goal of this thesis is realization of penetration and stress testing, processing the results into clear report and recommendation to remediate found vulnerabilities.
Security exercises for ethical hacking
Paučo, Daniel ; Lieskovan, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This master thesis deals with penetration testing and ethical hacking. Regarding to the layout of the thesis there was prepared appropiate enviroment to realize Red/Blue team exercise, where Red team is in a role of the attacker and Blue team is in a role of defender of the network infrastructure. Whole infrastructure is implemented in a cloud virtual enviroment of VMware vSphere. Second part of the thesis consists of preparation and creation of the exercise to test web application security. Third part of the thesis is dedicating to the automatization of redteaming. Main focus of this master thesis is to demonstrate different attack vectors how to attack the network infrastructure and web applications and use of the defense mechanisms to avoid this kinds of attacks.
Application of graph databases in cybersecurity
Tichý, Dušan ; Daniel,, Tovarňák (referee) ; Sedlák, Petr (advisor)
This bachelor thesis is aimed at introducing and proposing the use of graph databases in the field of cyber security, specifically in the area of phishing emails.

National Repository of Grey Literature : 76 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.