National Repository of Grey Literature 76 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Methodology for co-cryostorage of virus isolates in their host plants and relevant data
Bilavčík, A. ; Bjerkestrand, R. ; Bjelland, B. ; Blystad, D.-R. ; Bobrova, O. ; Fránová, Jana ; Faltus, M. ; Hamborg, Z. ; Hammond Hammond, S. D. ; Koloniuk, Igor ; Zámečník, J.
Currently, the nursery production of plant material emphasizes the production of healthy, virus-free material. For this reason, it is necessary to have reference plant materials in which the virus is present. Some types of viruses are difficult to maintain outside the plant host. Because of the potential transmission to outdoor plantings, it is necessary to keep infected plants in special cultivation areas, and net-houses, which brings considerable financial and labour costs. Therefore, a methodology was developed in which the virus status in plant material is analysed, the infected material can be stored using cryopreservation in liquid nitrogen and then regenerated in vitro, and relevant data in GeneEver cryobox can be stored.
Use of New Methods for Securing Remote Computers
Šandera, Vladimír ; Řihák, Petr (referee) ; Ondrák, Viktor (advisor)
This paper is focused on computer security services for households and small businesses. First I analyze the current situation on the computer security market. In theoretical part of the paper I will describe known types of security threats as viruses, malware, rootkits and counter measures against these threats. In practical part of the paper I analyze current conditions on the market, my business project and I introduce new concept for securing remote computers. I will talk about economical advantages of this concept as cost reduction, centralization of resources and increase in efficiency.
Antivirus protection of a computer from a boot repository
Mlejnek, Jiří ; Malina, Lukáš (referee) ; Burda, Karel (advisor)
ABSTRACT Theme of the thesis is the design method of anti-virus protection with the use of an alternative boot store. Processed is a related issue of viruses and the possibility of defenses against them. This thesis is focused on the design and selection of components solutions enabling the execution of antivirus test from the undistorted by the operating system. With selected components continues to realize an alternative booting the operating system from a Windows platform computer network with automatic virus checking of all local disks. The results of inspection are transmitted using signed files on a network server and typically give an overview of the results of the individual tests.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Cybercrime in the EU
Molnárová, Martina ; Loutocký, Pavel (referee) ; Stupka, Václav (advisor)
This bachelor thesis deals with cybercrime in the European Union at present time. It begins with a description of the most well-known historical cybercrimes, which has helped to create cybercrime as a separate branch of crime. Subsequently, the work describes the changes that have occurred in the development of cybercrime, describes the practical problems in prosecuting cybercrime and its current trends. At the same time, it outlines the problems that arise in producing adequate statistics. The practical part of the work then describes the basic function of the application, which was created to work for the purpose of providing information on cybercrime and clear mediation of available statistical information.
Modern computer viruses
Malina, Lukáš ; Malý, Jan (referee) ; Pust, Radim (advisor)
Bachelor’s thesis “Modern computer’s viruses” is composed from two mainly object (analysis computer’s viruses and suggestion of security middle computer network), separated for three parts: Analysis computer’s viruses, Personal suggestion of security personal computer end-user (computer terminal) and Personal suggestion of security middle computer network. Methods of transmission and infection, specific properties of viruses and impact upon personal computers are examined in the first part. Resolution of personal suggestion of security personal computer with help of antivirus software, personal firewall and antispam software is inducted in the second part. Futher, results of testing some free AV software and other security software are summarized with possible progress of configuration and recommendation for correct running this software. Complex suggestion of security middle computer network is adduced in the third part, where is inducted structure of security network. Configuration progression and recommendation for maximum security is indicated on particular used components. Structure is adapted for active network Cisco components, which are most used around these days. Completely suggestion of security network is directed on hardware firewall Cisco PIX, where is unfolded potential possibility of options. Futher, the third part contain some important tips and recommendation for completely working network, including setting security preference, security passwords and data encryption. Also, there is described various techniques monitoring and supervision working security network using complex monitoring software MARS (Cisco security monitoring, analyzing and response system) from Cisco company.
Proposal of Computer Network Security in a Small Software Company
Špičák, Jan ; Kastner, Miloš (referee) ; Ondrák, Viktor (advisor)
The bachelor thesis is concerned with the analysis of the current conditions of computer network security and its optimalization in a small software company. The thesis presents solutions how to improve the security of the computer network. The solutions are supposed to prevent the computer network from the Internet attacks and thus avoid losing important data and information.
Cybercrime: Concept, Detection and Prevention
Tureček, David ; Froehling, Kenneth (referee) ; Ellederová, Eva (advisor)
Tato bakalářská práce se zabývá koncepcí kybernetické kriminality. Začíná popisem historického vývoje kybernetické kriminality a s ní související počítačové technologie. Práce dále uvádí důvody, proč ke kybernetické kriminalitě dochází, a popisuje kybernetickou kriminalitu z praktičtějšího hlediska, přičemž analyzuje různé typy útoků a útočníků včetně názorných příkladů. Teoretická část práce je zakončena kapitolou věnující se prevenci a detekci kybernetických hrozeb. Účelem praktické části je ukázka jednoduchého Denial of Service útoku.
Robot for P2P Network Scanning
Holub, Michal ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
Bachelor's thesis describes the types of P2P networks, their most common mutations and protocols, and design and implementation of the system for browsing P2P networks. The purpose of the system for browsing P2P network is to search for files with unrecognized malicious code. This system is capable to search files on P2P network based on given set of keywords, download them to local disk and to determine whether they are executable or not.
Internet Criminality
Zelinka, Petr ; Konečný,, Zdeněk (referee) ; Soukup, Tomáš (advisor)
This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of this criminality, used methods and technological equipment. In the second part of diploma thesis there are suggested possible technical and legislative precautions against internet crime.

National Repository of Grey Literature : 76 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.