National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.
77 millions user accounts have been stolen, should we worry? Analysis of Internet discussions relevant to the topic
Gregor, Filip ; Švelch, Jaroslav (advisor) ; Nečas, Vlastimil (referee)
Diploma thesis 77 million PlayStation Network accounts stolen, does it affect us?: An analysis of Internet discussions revolving around this topic deals with the case of what so far seems to be the biggest case of user information leak on the Internet. The introduction outlines the history and development of PlayStation consoles and maps major attempts to jailbreak the last generation of the console by hackers. The following section presents PlayStation Network itself, whose users were at risk of the loss of their online identity because of the attack and chronologically describes the course of breach-related events including the subsequent theft of user data. It also focuses in detail on the case of GeoHot - a hacker whose dispute with Sony alienated fellow hacker community and initiated retaliatory activities which as a result led to loss of data. Another part of the thesis examines the issue of digital identity and its protection, gives an insight into the history of the formation of the hacker community and further explains the phenomenon of existence and perception of the term hacker in the context of the Internet. The final section is devoted to analysis of selected discussion posts under thematically relevant articles, analyzes them in terms of content relevance, information sentiment and...
Digital identity at the time of Google services
Skoček, Jakub ; Papík, Richard (advisor) ; Souček, Martin (referee)
The aim of the thesis was to find out what information of personal and impersonal nature users provide to Google in exchange for free use of its services and what image of digital identity can be compiled from this information. Since the concept of digital identity can be interpreted in different ways, its meaning is first determined for the purposes of this study. For a better understanding of the subject is further described a brief history and present of Google and the services it offers. Range of digital identity is influenced by the company's policy on the collection and storage of user data. For this reason, it is discussed in a separate chapter. The next part presents tools for managing digital identity available within the user account. In the practical part the real user data from all services associated with the user account were analyzed.
77 millions user accounts have been stolen, should we worry? Analysis of Internet discussions relevant to the topic
Gregor, Filip ; Švelch, Jaroslav (advisor) ; Nečas, Vlastimil (referee)
Diploma thesis 77 million PlayStation Network accounts stolen, does it affect us?: An analysis of Internet discussions revolving around this topic deals with the case of what so far seems to be the biggest case of user information leak on the Internet. The introduction outlines the history and development of PlayStation consoles and maps major attempts to jailbreak the last generation of the console by hackers. The following section presents PlayStation Network itself, whose users were at risk of the loss of their online identity because of the attack and chronologically describes the course of breach-related events including the subsequent theft of user data. It also focuses in detail on the case of GeoHot - a hacker whose dispute with Sony alienated fellow hacker community and initiated retaliatory activities which as a result led to loss of data. Another part of the thesis examines the issue of digital identity and its protection, gives an insight into the history of the formation of the hacker community and further explains the phenomenon of existence and perception of the term hacker in the context of the Internet. The final section is devoted to analysis of selected discussion posts under thematically relevant articles, analyzes them in terms of content relevance, information sentiment and...

Interested in being notified about new results for this query?
Subscribe to the RSS feed.