National Repository of Grey Literature 24 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
Increasing security awareness in the company
Novák, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The master’s thesis is focused on increasing security awareness in the company. The first chapter contains the theoretical background, which is necessary for creating a security education system. The second chapter deals with the analysis of the current situation, which is needed for determinating the need to increase security awareness. The third and last chapter contains the design of the education system itself.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.
Non-security of the Czech Army's soldiers on social networks
Kulhánek, Jan ; Ludvík, Jan (advisor) ; Kučera, Tomáš (referee)
The aim of this thesis is to examine the risk of the Czech Army not being properly secure on social networks, the behaviour of its uniformed members and their positive identification of social networking sites. The Russian aggression in the Ukraine and the hacking of Czech medical facilities have once again brought up the importance of cybersecurity and the role that it plays in the modern world, with the human factor being positively identified as the weakest link in security. This case study seeks to define the ideal types of soldier behaviour on social media and to analyse the potential risks that each type poses. To this end, this thesis first presents information necessary to fully understand the vast topic of cybersecurity on social media. Next, it defines several ideal types and their building blocks, in order to categorize the social media accounts of soldiers it later analyses. The author concludes that each defined ideal type has inherently problematic behaviours associated with it and carries with it a level of risk for the Army of the Czech Republic. However, the present user and family member ideal types were found to be the riskiest. Key words OSINT, SOCMINT, NATO, Czech Armed Forces, Cybersecurity, Security, Social media, Ideal type analysis, Social engineering Title The insecurity...
Application for building and displaying attack vectors using social engineering
Kašpar, Jan ; Vostoupal, Jakub (referee) ; Harašta, Jakub (advisor)
This thesis focuses on the most used social engineering techniques today, legislation related to social engineering and the development of a Red Teaming application. The thesis describes the social engineering techniques that are used, the paragraphs that are most commonly encountered in the use of these techniques and describes the functionality of the application that focuses on the Vishing technique and helps not to break the laws that have been identified as the most risky.
Návrh marketingové a obchodní strategie pro začínající startup v oblasti prodeje IT služeb
Vošmerová, Lucie
Vošmerová, L. Marketing and business strategy for IT services sale start up. Bachelor thesis. Brno: Mendel University, 2020. The bachelor thesis is focused on an IT services sale start up. For this start up is created marketing and business strategy. The strategy is based on situation analysis which includes a market environment and primary and secondary data. The questionnaire is also a part of the bachelor thesis. Because of segmentation, targeting, positioning and found information is created marketing and business strategy using marketing mix. The target of the strategy is raised public awareness of start up’s services.
Attacks on computers, servers and services
Bitner, Oldřich ; Novák, Jaroslav (advisor) ; Svoboda, Vladimír (referee)
TITLE: Attacks on computers, servers and services. SUMMARY: The aim of theoretical part is to describe global software attacks on computer systems, servers and their services. It also describes the way of performing illegal attacks and dividing of attackers according to their knowledge of the issue.Practical part of the theses focuses focucec on an examination of basic safety and durability of university software systems. KEYWORDS: The attacks, attacker, computer, north, service, social engineering, foreign identity.
Psychology of Phishing Attacks During Crises: The Case of Covid-19 Pandemic
Kaliňák, Viliam ; Erkomashvili, David (advisor) ; Špelda, Petr (referee)
Events and circumstances that accompany crises such as losses of loved ones, losses of material resources, dislocation, or physical harm, have an overall negative impact on people's mental health. It is this impaired state of man which makes him vulnerable to manipulation of social engineers who wants to take advantage of him in order to enrich themselves. This was also the case of the COVID-19 pandemic, the unprecedented crisis in modern history, during which phishing and fraud campaigns rapidly increased as people have been forced to stay safe at home and spent most of a day online. This work analyzes the psychological strategies of cybercriminals on a sample of more than 200 phishing e-mails in order to understand how the situation was abused and what can be learnt to prevent it in the future. It also provides theoretical and research frameworks for researchers who can apply it also on other types of crises. The results contribute to the fields of psychology, cybercrime as well as crisis management. Keywords COVID-19, phishing, social engineering, psychology, persuasion, crises, pandemic, impersonation, pretexting
Increasing security awareness in the company
Novák, Petr ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The master’s thesis is focused on increasing security awareness in the company. The first chapter contains the theoretical background, which is necessary for creating a security education system. The second chapter deals with the analysis of the current situation, which is needed for determinating the need to increase security awareness. The third and last chapter contains the design of the education system itself.

National Repository of Grey Literature : 24 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.