National Repository of Grey Literature 1,353 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Tourism participants' psychological responses to terrorism and related security threats: Geographical conditionality and manifestations
Krajňák, Tomáš ; Vágner, Jiří (advisor) ; Siwek, Tadeusz (referee) ; Daněk, Petr (referee)
Existing literature examining the impacts of safety and security on tourism has paid considerable attention to the role of the psychological responses of tourism participants. It has also confirmed the centrality of these responses in the process of how security threats influence tourist behaviour. However, no attempt has been made to clarify whether the psychological responses are also geographical in nature. The dissertation primarily intends to address this shortcoming by examining the influence of political- security threats. Therefore, its main aim is to identify and clarify the geographical conditionality and manifestations of tourism participants' psychological responses to terrorism and related security threats. The empirical part of the dissertation is the result of several conducted studies published in four journal articles. Therefore, multiple methods of data collection and analysis were used to achieve the main aim of the thesis. The work required a certain pragmatic approach to engage both positivist and more interpretivist methods. Still, consistency between the philosophical starting points and the adopted methods was not neglected, as it prevailed in the treatment of the sub-aims and in the resultant publication outputs. Specifically, the methods employed include a systematic...
Design Better Content Development Process for SCAP Standards
Beňas, Petr ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Cílem této práce je nastudovat a zjednodušeně popsat standardy SCAP používané pro standardizované předávání informací o zranitelnostech a dalších dat souvisejících s informační bezpečností, se zaměřením na formáty XCCDF a OVAL. V textu jsou zkoumány existující přístupy a nástroje sloužící k tvorbě obsahu těchto standardů. Na základě získaných poznatků je navržen nový nástroj s cílem řešit nedostatky existujících přístupů. Text práce také popisuje implementaci a testování navrženého nástroje.
Methods of steganography
Obdržálková, Karolína ; Blažek, Petr (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis deals with steganography, its types and methods. Steganography is generally described in this work. A significant part of this thesis is devoted to the development of steganography and also describes how is steganography used for malware and copyright protection. The next part describes the types of steganography according to the type of carrier, their methods and properties of steganographic methods. Based on theoretical knowledge, an application with a graphical user interface was created to hide and reveal secret information using steganographic method LSB. This application is described in the final part together with the evaluation of security of hidden information.
Fast Processing of Application-Layer Protocols
Bárta, Stanislav ; Martínek, Tomáš (referee) ; Polčák, Libor (advisor)
This master's thesis describes the design and implementation of system for processing application protocols in high-speed networks using the concept of Software Defined Monitoring. The proposed solution benefits from hardware accelerated network card performing pre-processing of network traffic based on the feedback from monitoring applications. The proposed system performs pre-processing and filtering of network traffic which is handed afterwards passed to application modules. Application modules process application protocols and generate metadata that describe network traffic. Pre-processing consists of parsing of network protocols up to the transport layer, TCP reassembling and forwarding packet flow only to modules that are looking for a given network traffic. The proposed system closely links intercept related information internal interception function (IRI-IIF) and content of communication internal interception function (CC-IIF) to minimize the performing of duplicate operations and increase the efficiency of the system.
Configurable Telemetric and Monitoring System
Voborník, Petr ; Trchalík, Roman (referee) ; Ryšavý, Ondřej (advisor)
A goal of this thesis is design and implementation of modular system for telemetry and security purposes. System consists of modules for processing incoming data, web administration and presenation interface and set of web services. For implementation is used C# language along with .NET Framework and ASP.NET.
Hardware cryptographic modules for LAN security
Loutocký, Tomáš ; Lambertová, Petra (referee) ; Zeman, Václav (advisor)
The thesis deal with the problems of virtual private network (VPN). The first part of the thesis is focused on the description of the basic terms of computer security which are useful for better understanding the other parts. There is a description of VPN technology and its separation of VPN by various aspects in the second part of the thesis. The next chapter is dedicated to the description of realization of VPN by using IPSec. There is shown how to secure laboratory network by using of the products of the Safenet Company in the practical part of the thesis. There are also stated the modular techniques how to use products in the network in practical part. Some of the modular techniques describe security weaknesses of the products which are possible to exploit in the laboratory network and they also describe the ways how to protect them against misusage.
Possibilities of securing inter-processor communication for dedicated devices
Rácek, Luboš ; Člupek, Vlastimil (referee) ; Troják, David (advisor)
Diploma thesis focuses on introduce problematic issue of inter-core communication, implementation of Linux distribution made by project Yocto on chosen platform of NXP i.MX microcontrolers family and solution for secured inter-core communication.
Security and Privacy in IoT
Utěkal, Josef ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor's thesis deals with the topic of security and privacy in the field of Internet of Things (IoT), for which resource constrained devices are typical. It is very important to find a suitable operating system that, in addition to low computational requirements, would also offer the desired functionality for these constrained IoT devices, such as real-time capabilities. OS RIOT seems to be the one for IoT. It enables you to run applications written in C language on any supported hardware -- in this bachelor's thesis specifically on Arduino Uno and Arduino Due. The thesis also describes several cryptographic libraries that are supported by OS RIOT. The aim is to implement selected cryptographic libraries and measure their computational and memory requirements on both Arduino devices. This is preceded by a theoretical and practical familiarization with OS RIOT, which is realized by creating the first project, and measuring the computational complexity of each cryptographic function of the WolfSSL library on the Raspberry Pi 4 Model B.
Bezpečný model elektronického obchodování a jeho ekonomické
Fotijev, Pavel ; Smejkal, Vladimír (advisor)
The purpose of the presented dissertation thesis is to contribute to the development of the theory of electronic commerce in complex conditions of „network economy“ by the partial consolidation and integration of the highly fragmented existing knowledge and ideas, i.e. to offer more compact conceptual framework, based on research of the current state of knowledge and situation in the conditions of the Czech Republic. The thesis is focused on the contemporary theoretical knowledge analysis from the areas of interest concerning the electronic commerce security, used models of electronic shops and evaluation of its economic aspects, which this type of business bears. Next contribution is unification of this knowledge and creation of the conceptual base for the ongoing recognition and theory building related to electronic commerce. The work is also focused on the area of electronic cash, possible solution of some diversifications in payment transactions. On the practical level the author attempted to narrow the knowledge “gap” in the empirical cognition of the doctoral thesis issues concerning the effectiveness of electronic commerce and generally e-commerce applications. Proposed return on investment calculation methodology applied to e-commerce area may help managers making decisions in investing to these projects.
Presentation of Web API Data in Windows 8 Application
Kalus, Jiří ; Maršík, Lukáš (referee) ; Milička, Martin (advisor)
The aim of this bachelor's thesis is to design and implement a Windows 8 application that can provide data from web API. Transferred data are sensitive for the user with an emphasis for authorization and security. Data is displayed in real time. The thesis decribes possibilities for development of the application for WinRT architecture, communication of the application with web API, authorization and security of transffered and offline data. The application of dashboard type was created that display data from various financial categories. For the visualization basic graphic components were used, some of them includes animations.

National Repository of Grey Literature : 1,353 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.