National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Security Enhancement Deploying SIEM in a Small ISP Environment
Bělousov, Petr ; Jan,, Hrnčíř (referee) ; Sedlák, Petr (advisor)
Diplomová práce se zaměřuje na zvýšení bezpečnosti v prostředí malého poskytovatele internetu nasazením SIEM systému. Dostupné systémy jsou porovnány a zhodnoceny v souladu s požadavky zadávající firmy. Projekt nasazení systému SIEM je navržen, implementován a zhodnocen v souladu s unikátním prostředím firmy.
Analysis of the GlobeImposter ransomware
Procházka, Ivo ; Komosný, Dan (referee) ; Martinásek, Zdeněk (advisor)
The aim of this diploma thesis is to analyze an instance of the GlobeImposter ransomware extracted from an affected device. The first part outlines various types of malware and ransomware and includes a description of encryption mechanisms and key distribution systems. It also discusses possible approaches of static and dynamic analysis of malware samples and requirements for test environments. The practical part describes the source of the malware sample, the physical and virtual test environment and the results of the static and dynamic analysis of the GlobeImposter ransomware. The final part discusses the results and the possibility of implementing a decryptor for the analyzed GlobeImposter ransomware.
Non-security of the Czech Army's soldiers on social networks
Kulhánek, Jan ; Ludvík, Jan (advisor) ; Kučera, Tomáš (referee)
The aim of this thesis is to examine the risk of the Czech Army not being properly secure on social networks, the behaviour of its uniformed members and their positive identification of social networking sites. The Russian aggression in the Ukraine and the hacking of Czech medical facilities have once again brought up the importance of cybersecurity and the role that it plays in the modern world, with the human factor being positively identified as the weakest link in security. This case study seeks to define the ideal types of soldier behaviour on social media and to analyse the potential risks that each type poses. To this end, this thesis first presents information necessary to fully understand the vast topic of cybersecurity on social media. Next, it defines several ideal types and their building blocks, in order to categorize the social media accounts of soldiers it later analyses. The author concludes that each defined ideal type has inherently problematic behaviours associated with it and carries with it a level of risk for the Army of the Czech Republic. However, the present user and family member ideal types were found to be the riskiest. Key words OSINT, SOCMINT, NATO, Czech Armed Forces, Cybersecurity, Security, Social media, Ideal type analysis, Social engineering Title The insecurity...
Autonomous Vehicles Liability Insurance
Hořavová, Maria ; Vybíral, Roman (advisor) ; Tuláček, Michal (referee)
Autonomous Vehicles Liability Insurance Abstract The diploma thesis is focused on the issue of autonomous vehicles and its liability insurance as it is a very current topic, as evidenced by extensive discussions across the professional and lay public. The aim of this thesis is to analyse the currently existing legal framework at national, EU and international level and to clarify whether the current legal framework is sufficient for the operation of autonomous vehicles. The liability insurance system itself and the principles of its operation are also analysed with regard to their suitability for autonomous transportation. Where deficiencies are identified, de lege ferenda considerations are outlined, and expected changes as well as appropriate solutions are identified. In addition, the diploma thesis provides a meaningful introduction to the principles of autonomous vehicles and discusses other areas closely related to liability insurance for damage caused by the operation of autonomous vehicles. The diploma thesis is divided into five separate chapters. These chapters are structured in such a way that the reader first gains an understanding of the topic and becomes familiar with the complex system of autonomous vehicles. In the first chapter, the reader is introduced to the concept of an autonomous...
Security Implications of Deepfakes in Face Authentication
Šalko, Milan ; Goldmann, Tomáš (referee) ; Firc, Anton (advisor)
Deepfakes, médiá generované hlbokým strojovým učením, ktoré sú pre človeka nerozoznateľné od skutočných, zažívajú v posledných rokoch obrovský rozmach. O ich schopnosti oklamať ľudí už bolo napísaných niekoľko desiatok článkov. Rovnako závažný, ak nie závažnejší, môže byť problém, do akej miery sú voči nim zraniteľné systémy rozpoznávania tváre a hlasu. Zneužitie deepfakes proti automatizovaným systémom rozpoznávania tváre môže ohroziť mnohé oblasti nášho života, napríklad financie a prístup do budov. Táto téma je v podstate nepreskúmaným problémom. Cieľom tejto práce je preskúmať technickú realizovateľnosť útoku na rozpoznávanie tváre. Experimenty opísané v práci ukazujú, že tento útok je nielen uskutočniteľný, ale navyše útočník naň nepotrebuje veľa prostriedkov. V práci je opísaný aj rozsah tohto problému. V závere je opísaných aj niekoľko navrhovaných riešení tohto problému, ktoré vôbec nemusia byť náročné na implementáciu.
Industrial field buses and communication
Košťál, Radovan ; Kroupa, Jiří (referee) ; Bražina, Jakub (advisor)
This bachelor’s thesis deals with the issue of industrial fieldbuses and communication. The theoretical part describes the current state of implementation of industrial fieldbuses and the characteristics of individual communication protocols. Options for cybersecurity are also mentioned. The second, practical part, describes the establishment of communication between a simulated PLC in the TwinCAT 3 program and Node-RED environment using the MQTT protocol and Mosquitto broker.
IT/OT modular honeypot
Nečas, Martin ; Fujdiak, Radek (referee) ; Blažek, Petr (advisor)
V bakalářské práci byl realizován modulární a škálovatelný systém honeypotů zaměřený na IT a OT. Cílem bylo navrhnout a implementovat systém, který umožní snadné přidávání modulů reprezentujících komunikační protokoly a virtuální zařízení a silně zdůrazňuje modularitu. Honeypoty jsou nasazeny v kontejnerech a systém aktivně monitoruje komunikaci mezi těmito kontejnery a útočníky. Všechny komunikační aktivity jsou uloženy v centralizovaném logu pro důkladnou analýzu a monitorování.
Cyber security of endpoint elements
Fabík, Václav ; Procházka, Rudolf (referee) ; Smékal, Zdeněk (advisor)
This paper describes the design of cyber security for endpoints working on the ARM hardware architecture with the Linux operating system and using the TCP/IP and UDP/IP protocols for network communication. In the introduction, the reader is introduced to the basic concepts of cyber security as well as to the public key infrastructure (PKI) and ways of establishing a secure connection. The reader is introduced to the basic security techniques and the standard regulating security for industrial automation systems. In the practical part, the threat assessment of the presented network infrastructure is elaborated, and security functions that are embedded in NXP i.MX 7 processors and can be used for the cryptographic security of these devices are described.
The TikTok phenomenon and its influence and perception in Czechia
Kudyn, Viktorija ; Ortová, Nina (advisor) ; Vranka, Marek (referee)
Annotation: Bachelor's thesis aims to define perception of the TikTok social media platform in Czechia. Theoretical part covers the evolution of the platform alongside other prominent social media, reasons for its growing popularity and security challenges it faces globally, with focus on the most prominent case of TikTok ban executed by Donald Trump, president of the United States. Quantitative survey among respondents aged 13-35 looks into the perception of TikTok among Czechs in aspects examined in theoretical part. Respondents included active users of the application as well as those who are aware of its' existence but are not present on the social media. Survey analysis aims to compare the answers of respondents aged 13-18 and 19-35 and define their differences in views. Those views are then summarized to give a possible bigger picture of the situation in Czechia.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.