National Repository of Grey Literature 41 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Typology of spam email written in Czech language
Vejda, Prokop ; Mňuková, Dominika (advisor) ; Podzimek, Jan (referee)
The presented thesis proposes a new typology system for Czech-language email spam. Its categorization is based primarily on the persuasive method used. Particular factors relevant for the classification are derived from subsurface observations via the method of semiotic analysis. The multi-layered typology differentiates between spam sales and imitation spam, between identity-imitating and situation-imitating spam. Another layer of categorization identifies the area of incentive for the desired action. The areas are finance, health, sexuality, and consumption. Ideological spam is recognized as a separate category. The typology derives validity from its application to a sample of Czech spam emails originating between January and April 2023. The method used is quantitative content analysis, which allowed the observed characteristics to be presented in a statistical context. Furthermore, it made it possible to elementarily map the nature of spam appearing in the email inboxes of Czech-speaking recipients at the beginning of 2023. The research is based upon a survey of existing typological systems and cases of the application of semiotic analysis to email spam. Theoretical research pillars are the concepts of the social role, speech acts, mythology, and uncertainty of meanings in communication. The...
Criminal and criminological aspects of the phishing
Žilková, Markéta ; Gřivna, Tomáš (advisor) ; Richter, Martin (referee)
Criminal and criminological aspects of the phishing Abstract Present thesis is aimed on analysis of criminal and criminological aspects of phishing. While gathering the literature resources lack of studies systematically describing the problematic of phishing was discovered even though phishing is one of the most common cybernetical crimes and represents a significant thread for users of cyberspace. Czech literature is especially lacking studies concerning criminological aspects of phishing. This thesis is divided to two parts - criminological and criminal. This thesis presents complex description of phishing including its evolution and process of refinement. In the first part phishing as a phenomenon and also its history and types evolving with time are described. The aim of this thesis is to evaluate the trend of number of phishing attacks and to determine whether its increasing, decreasing or level. Given the human interactions in cyberspace increasing trend is expected. In the next part characteristics and motivation of offender, characteristics of the victim and possibilities of prevention are discussed. In this part mostly international sources are being used given the absence of Czech sources. In the criminal part European legislative is briefly mentioned. Nevertheless, this thesis is written in the...
Application for cloning websites for security testing
Kubíčková, Dita ; Sikora, Marek (referee) ; Martinásek, Zdeněk (advisor)
The master thesis is focused on developing application for website cloning that could be used in phishing campaign during security testing. The theoretical part describes social engineering with emphasis on phishing. It also introduces phishing campaigns steps’ and attack framework. Then, it compares currently used tools for website cloning and evaluates their shortcomings. The practical part deals with development of the application in Python using Web Driver and provides the results of application testing in comparison to GoPhish which is often used for website cloning.
Psychology of Phishing Attacks During Crises: The Case of Covid-19 Pandemic
Kaliňák, Viliam ; Erkomashvili, David (advisor) ; Špelda, Petr (referee)
Events and circumstances that accompany crises such as losses of loved ones, losses of material resources, dislocation, or physical harm, have an overall negative impact on people's mental health. It is this impaired state of man which makes him vulnerable to manipulation of social engineers who wants to take advantage of him in order to enrich themselves. This was also the case of the COVID-19 pandemic, the unprecedented crisis in modern history, during which phishing and fraud campaigns rapidly increased as people have been forced to stay safe at home and spent most of a day online. This work analyzes the psychological strategies of cybercriminals on a sample of more than 200 phishing e-mails in order to understand how the situation was abused and what can be learnt to prevent it in the future. It also provides theoretical and research frameworks for researchers who can apply it also on other types of crises. The results contribute to the fields of psychology, cybercrime as well as crisis management. Keywords COVID-19, phishing, social engineering, psychology, persuasion, crises, pandemic, impersonation, pretexting
Application of graph databases in cybersecurity
Tichý, Dušan ; Daniel,, Tovarňák (referee) ; Sedlák, Petr (advisor)
This bachelor thesis is aimed at introducing and proposing the use of graph databases in the field of cyber security, specifically in the area of phishing emails.
Ochrana před sociálním inženýrstvím
Vrbasová, Lenka
This bachelor's thesis focuses on the issue of social engineering and defense against it. Social engineering attacks present significant threat for common citizens and organizations. The Thesis is divided to five main topics. There is social engineering definition, methods, attacks in the Czech Republic, user protection and bank protection. The last section of this thesis is based on strategic analysis of micro enviroment and macro-enviroment.
Možnosti zabezpečení proti sociálnímu inženýrství v oblasti elektronického bankovnictví
Kubričan, Ondrej
Bachelor thesis deals with social engineering methods in relation to electronic banking. It points to the security features and defense mechanisms of Internet banking and analyzes them in selected banks of the Czech Republic. After the analysis suggests increasing the security of online banking
Phishing Detection in Web Pages
Beňo, Marek ; Hrivňák, Ján (referee) ; Holkovič, Martin (advisor)
This work deals with the design of a phishing attack detection and classification tool. The work describes techniques and forms of phishing attacks and availible tools and techniques for phishing detection. Based on the analysis of existing tools a solution for file classification is proposed. Implemented tool handles input parsing and creation of input model. Model is based on hybrid analysis of input file and URL. Using the YARA tool, YARA rules are applied which are then used in creation of input classification. Analysis of input model and definition of classification rules is enabled by implemented YARA module. Implemented solution makes it possible to define YARA rules for phishing classification based on the structural properties of a phishing file and features of source URL.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Analýza způsobů informační bezpečnosti pro uživatele internetu
Vladimirova, Ekaterina ; Luc, Ladislav (advisor) ; Novotný, Jakub (referee)
This thesis is devoted to the information security risk analysis methods for Internet users. Its main objectives include familiarizing Internet users with the types of Internet security threats, analyzing the most prominent anti-virus software, giving instructions for installing a Windows firewall, and providing recommendations on information security. The theoretical part describes the main and most popular services offered on the Internet, as well as the history and development of the Internet. Other chapters focus on information security and describe the types of malware threats that might be encountered on the Internet. In the conclusion of the theoretical part the means of protection against cybercrime, i.e. anti-virus programs and firewalls are characterized. The practical part consists of three parts. The first part is devoted to the evaluation of seven popular antivirus programs with their own firewall in accordance with the selected criteria. The second part gives instructions on how to configure Windows 8 Firewall. Finally, recommendations for Internet users are provided, which must be observed for their own safety.

National Repository of Grey Literature : 41 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.