National Repository of Grey Literature 9 records found  Search took 0.01 seconds. 
Forensic analysis of a web browser
Bača, Michal ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This term project deals with digital forensic analysis of web browsers. The first chapters describe the process of forensic analysis, methodologies and procedures used, and also the issues of analysis of web browsers. In particular, the types of information browser stores and security problems that comes with that. Theoretical and practical procedure for obtaining data from Mozilla Firefox web browser was based on the theoretical foundations described in previous chapters. Common linux tools and application created as part of this thesis are used in process of collecting digital evidence. Digital forensic analysis of web broewser was performed based on suggested procedure.
Collecting Indicators of Compromise from Operating Systems
Procházka, Jiří ; Ryšavý, Ondřej (referee) ; Grégr, Matěj (advisor)
Focus of this thesis is on the design and implementation of an application for gathering indicators of compromise from the systems. In the thesis, there is an introduction to the term indicator of compromise and description of commonly used categories. Next, there is a summary of existing tools with a similar focus. In the thesis, there is a list of some existing formats for sharing of indicators of compromise and selection of format which resulting application uses. After the implementation, application was tested both locally and on infrastructure of cyber exercise.
Security games "Capture The Flag"
Karabina, Lukáš ; Pospíšil, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
Bachelor’s thesis is focused on providing general information about "capture the flag" security games. It deals with the basic categorization of this type of games, it also describes various categories for tasks that can be included within these games. The thesis analyzes selected available platforms for organizing "capture the flag" security games. At first the thesis deals with security games in general, then deals with basic categorization of tasks, that are often included in these games, then continues with the issue of selecting a suitable platform for the practical part of the thesis to support the courses dealing with cryptography and cyber sercurity. Finally, thesis discribes the individual tasks that were implemented in its practical part.
Comparison of education information and cybernetic security in Czech republic and South Korea with suggestions for improvement
Šisler, Marcel ; Zápotočný, Matej (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with a suggestions to improve the current state of education information and cyber security in the Czech Republic. These suggestions are from a comparison of education at the Brno University of Technology - Faculty of Business and Hallym University in South Korea. Another part is the analysis of trends in the field of cyber attacks and comparison of this area between the Czech Republic and South Korea.
Comparison of education information and cybernetic security in Czech republic and South Korea with suggestions for improvement
Šisler, Marcel ; Zápotočný, Matej (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with a suggestions to improve the current state of education information and cyber security in the Czech Republic. These suggestions are from a comparison of education at the Brno University of Technology - Faculty of Business and Hallym University in South Korea. Another part is the analysis of trends in the field of cyber attacks and comparison of this area between the Czech Republic and South Korea.
Security games "Capture The Flag"
Karabina, Lukáš ; Pospíšil, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
Bachelor’s thesis is focused on providing general information about "capture the flag" security games. It deals with the basic categorization of this type of games, it also describes various categories for tasks that can be included within these games. The thesis analyzes selected available platforms for organizing "capture the flag" security games. At first the thesis deals with security games in general, then deals with basic categorization of tasks, that are often included in these games, then continues with the issue of selecting a suitable platform for the practical part of the thesis to support the courses dealing with cryptography and cyber sercurity. Finally, thesis discribes the individual tasks that were implemented in its practical part.
Collecting Indicators of Compromise from Operating Systems
Procházka, Jiří ; Ryšavý, Ondřej (referee) ; Grégr, Matěj (advisor)
Focus of this thesis is on the design and implementation of an application for gathering indicators of compromise from the systems. In the thesis, there is an introduction to the term indicator of compromise and description of commonly used categories. Next, there is a summary of existing tools with a similar focus. In the thesis, there is a list of some existing formats for sharing of indicators of compromise and selection of format which resulting application uses. After the implementation, application was tested both locally and on infrastructure of cyber exercise.
Analýza spolehlivosti forenzních nástrojů pro zkoumání malé digitální techniky
PĚSTOVÁ, Karolína
This bachelor thesis deals with forensic tools for investigating small digital devices. In theoretical part are described principles in digital forensic analysis and approaches for examining mobile phones. In practical part are analysed selected mobile phones with tools for investigating small digital devices. In this part are evaluated results and proposed a solution for acquiring the most relevant data.
Forensic analysis of a web browser
Bača, Michal ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This term project deals with digital forensic analysis of web browsers. The first chapters describe the process of forensic analysis, methodologies and procedures used, and also the issues of analysis of web browsers. In particular, the types of information browser stores and security problems that comes with that. Theoretical and practical procedure for obtaining data from Mozilla Firefox web browser was based on the theoretical foundations described in previous chapters. Common linux tools and application created as part of this thesis are used in process of collecting digital evidence. Digital forensic analysis of web broewser was performed based on suggested procedure.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.