National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Intrusion prevention system based on Raspberry Pi
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovered 20 362 vulnerabilities. The probability of cyber-attacks realization is high. Therefore it is necessary to propose and implement automated and low-cost Intrusion Prevention or Intrusion Detection Systems (IPS/IDS). This implemetation can focus on home use or small corporate networks. The main goal of the system is to detect or mitigate cyber-attack impact as fast as possible. The master's thesis proposes IPS/IDS based on Raspberry Pi that can detect and prevent various cyber-attacks. Contents of this thesis are focus on description of cyber-attacks based on ISO/OSI model's Link and Network layers. Then there is description of IPS/IDS systems and theirs open source representatives. The practical part is focus on experimental workspace, hardware consumption of choosen detection systems, cyber-attacks scenarios and own implementation of detection program. Detection program is based on these chosen systems and puts them together to be easily manageable.
Intrusion prevention system based on Raspberry Pi
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovered 20 362 vulnerabilities. The probability of cyber-attacks realization is high. Therefore it is necessary to propose and implement automated and low-cost Intrusion Prevention or Intrusion Detection Systems (IPS/IDS). This implemetation can focus on home use or small corporate networks. The main goal of the system is to detect or mitigate cyber-attack impact as fast as possible. The master's thesis proposes IPS/IDS based on Raspberry Pi that can detect and prevent various cyber-attacks. Contents of this thesis are focus on description of cyber-attacks based on ISO/OSI model's Link and Network layers. Then there is description of IPS/IDS systems and theirs open source representatives. The practical part is focus on experimental workspace, hardware consumption of choosen detection systems, cyber-attacks scenarios and own implementation of detection program. Detection program is based on these chosen systems and puts them together to be easily manageable.
Risk and legal aspects of company's cyber security
Smejkal, Vladimír ; Hortai, Vladimír ; Molnárová, Anikó
The development of the entire IT sector is very dynamic and its consequences penetrate into all spheres of life of society. With the increase in the use of information technology, the risk of its abuse is rising. Targeted attacks against information technologies are a global phenomenon and their impact is causing massive economic damage in both the public and private sectors. The fight against cybercrime is never ending; that is why the issue of preventive measures reducing the risk of cyber-attacks is so significant and permanently present. Risk management, or rather building secure information systems, is an iterative, never-ending process that lasts as long as there are assets that need to be protected. It follows from the above that a company secured against cyber-attacks has a higher market value, even though its book value may be the same as the value of a less stable firm. The paper deals with the mutual influence of risk management and the sustainability of the company's operations, including the projection of risk management indicators into the value of an enterprise.
Analýza dopadu počítačových trestných činů na podniky
Belgoziyeva, Ulpan ; Pavlíček, Antonín (advisor) ; Böhmová, Lucie (referee)
Global networks enable businesses to operate beyond the geographical boundaries and to make their processes more efficient. However, with digitalization, there also comes threats for businesses and sometimes companies are underestimating the risks associated with cyber-attacks. As the topic is relatively new, there are not many studies that took a deep look at the impact of cyber-attacks on the businesses and analyze those impacts from different angles. The key objective of the thesis was to cover key aspects of the impacts that cyber crimes can have on businesses, taking into account the various types of cyber-attacks, no matter the size and the sector of activity in which the company operates. To achieve this, I used synthesis analysis of real cyber-attacks cases, and I have split each effect into various categories using classification analysis. Furthermore, to study deeply the consequences that cyber incidents can have on businesses, I have analyzed in depth two large corporations that have suffered such attacks, and I have interviewed 15 experts working in the field of cyber-security. This analysis helped to achieve a complete and segmented picture of the impacts that cyber incidents had on businesses and showed how significantly these could affect business.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.