• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 149
  • 29
  • 20
  • 6
  • 6
  • 6
  • 1
  • 1
  • Tagged with
  • 273
  • 273
  • 97
  • 77
  • 64
  • 59
  • 48
  • 48
  • 39
  • 39
  • 34
  • 30
  • 29
  • 28
  • 28
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Zavedení bezpečnostních opatření dle ISMS pro základní školu / Implementing of security measures according to ISMS for elementary school

Pexa, Marek January 2019 (has links)
The diploma thesis deals with introduction of security measures for primary and elementary school. The thesis is devided into three main parts. The first part deals with basic theoretical concepts of information security and legislative elements needed for understanding the issue. The second part desrcibes the current state for primary and elementary school. The last practical part includes proposal of security measures and recommendations.
142

Specifické metody detekce anomálií v bezdrátových komunikačních sítích / Specific anomaly detection methods in wireless communication networks

Holasová, Eva January 2020 (has links)
The diploma thesis is focuses on technologies and security of the wireless networks in standard IEEE 802.11, describes the most used standards, definition of physical layer, MAC layer and specific technologies for wireless networks. The diploma thesis is focused on description of selected security protocols, their technologies as well as weaknesses. Also, in the thesis, there are described security threats and vectors of attacks towards wireless networks 802.11. Selected threats were simulated in established experimental network, for these threats were designed detection methods. For testing and implementing designed detection methods, IDS system Zeek is used together with network scripts written in programming language Python. In the end there were trained and tested models of machine learning both supervised and unsupervised machine learning.
143

Zachytávání kybernetických hrozeb industriálních systémů / Capturing cyber-threats of industrial systems

Dobrík, Andrej January 2020 (has links)
S vedomím že kybernetické útoky stoja korporácie každoročne miliardy, počínajúc neoprávnenými útokmi, distribuovanými útokmi odmietnutia služieb (DDOS) až po vírusy a počítačové červy atď., prichádza problém s nástrojmi, ktoré majú k dispozícii správcovia systému. Táto diplomová práca sa venuje skúmaniu jedného z takýchto nástrojov, Honeypot. Presnejšie, Honeypot zariadeniam pre priemyselné riadiace systémy. Od historicky počiatočných implementácií takýchto systémov, cez analýzu súčasných riešení až po vytvorenie nového riešenia Honeypot, s vysokou mierou interakcie a následným nasadením na nový virtuálny súkromný server, po ktorom nasleduje analýza narušení, ktoré sa vyskytnú počas obdobia nasadenia.
144

Základy bezpečnostního povědomí pro žáky základních škol / Basics of security awareness for pupils at primary school

Přibyl, Aleš January 2020 (has links)
This diploma thesis looks at building educational modules that will serve to build a basic awareness of safety for children in primary schools. The theoretical part describes the basic information from this area. The next part describes the assignment of individual modules and also describes the schools where the teaching took place. The practical section contains detailed fillings of these education modules.
145

Vytvoření help desku SW nástroje pro řízení kybernetické bezpečnosti / Creating a help desk SW tool for cyber security management

Brzobohatá, Veronika January 2021 (has links)
The diploma thesis is focused on the creation of a helpdesk design for ESKO software. This ESKO software was developed by ISIT Slovakia s.r.o. The helpdesk will be represented by several software. Some are used to create diagrams and represent workflows, others for graphic editing. The helpdesk will be created based on the current needs of the company and then delivered to it as the final product. The main goal is to extend the functionality of an existing website and add to this website and the proposed helpdesk. The bonus will be a query library, which should work on the principle of an SQL database.
146

Návrh Plánu obnovy pro infrastrukturu podnikatelské fakulty / Draft Recovery Plan for the infrastructure of the Faculty of Business and Management

Srnec, Jan January 2021 (has links)
This diploma thesis deals with the proposal of a “Disaster Recovery Plan” for the Informatics department at BUT’s Faculty of Business and Management. The first part consists of theoretical basis of crucial parts of disaster recovery plan, which is the very foundation for the proposal itself. The second part follows up with a description of the server room of the Informatics department, in particular its IT equipment. The third part deals with the very disaster recovery plan proposal which will function as a school code regulation and a foundation for a Business Continuity Management System document.
147

Impact of mobile botnet on long term evolution networks: a distributed denial of service attack perspective

Kitana, Asem 31 March 2021 (has links)
In recent years, the advent of Long Term Evolution (LTE) technology as a prominent component of 4G networks and future 5G networks, has paved the way for fast and new mobile web access and application services. With these advantages come some security concerns in terms of attacks that can be launched on such networks. This thesis focuses on the impact of the mobile botnet on LTE networks by implementing a mobile botnet architecture that initiates a Distributed Denial of Service (DDoS) attack. First, in the quest of understanding the mobile botnet behavior, a correlation between the mobile botnet impact and different mobile device mobility models, is established, leading to the study of the impact of the random patterns versus the uniform patterns of movements on the mobile botnet’s behavior under a DDoS attack. Second, the impact of two base transceiver station selection mechanisms on a mobile botnet behavior launching a DDoS attack on a LTE network is studied, the goal being to derive the effect of the attack severity of the mobile botnet. Third, an epidemic SMS-based cellular botnet that uses an epidemic command and control mechanism to initiate a short message services (SMS) phishing attack, is proposed and its threat impact is studied and simulated using three random graphs models. The simulation results obtained reveal that (1) in terms of users’ mobility patterns, the impact of the mobile botnet behavior under a DDoS attack on a victim web server is more pronounced when an asymmetric mobility model is considered compared to a symmetric mobility model; (2) in terms of base transceiver station selection mechanisms, the Distance-Based Model mechanism yields a higher threat impact on the victim server compared to the Signal Power Based Model mechanism; and (3) under the Erdos-and-Reyni Topology, the proposed epidemic SMS-based cellular botnet is shown to be resistant and resilient to random and selective cellular device failures. / Graduate
148

Proces sekuritizace kybernetické bezpečnosti EU / Securitisation process of cyber security in the EU

Jiskra, Denis January 2020 (has links)
21. 5. 2020 Abstract Securitisation proces of the cyber security in the EU Denis Jiskra Institute of Political Science Studies, Faculty of Social Sciences, Charles University 2019/2020 The diploma thesis is dealing with the development of the European Union's cyber security policy during the specific time frame since the 1990's until the current time. The thesis is focused on the securitization process, that so, dynamic intersubjective process of threat construction with the aim to find out, to what extent securitization formed the cyber security policy of the European Union. The subject of the thesis is also an analysis of the cyber security narrative topics with the aim to determine which topic leads and if there are changes between them during the research period. In this respect, the model of cyber security discourse variations inspired by the Copenhagen school will be used. In the current thesis will be also introduced the development of cyber threats, its historical contextualization, as well as their gradual globalization.
149

Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL

Rabbani, Talvia January 2016 (has links)
In this Master Thesis, several common applications used with MySQL and Linux server are modelled using the Enterprise Architecture Analysis Tool (EAAT) and the Cyber Security Modelling Language (CySeMoL), both developed by the Department of Industrial Information and Control System (ICS) at KTH. The objective of this study is to use the CySeMoL tool to evaluate the feasibility and correctness of the tool by simulating some particular type of attacks on a real life Linux server. A few common applications with MySQL on a Linux server and two Linux operating system services are modelled and explained together with their detailed information and defense mechanisms. A real life penetration test has then been carried out in order to validate the simulated results from the tool. The results of the analysis suggest that the security vulnerability predictions done by CySeMoL on a Linux server has good predictive performance. / I denna Masteruppsats modelleras ett antal vanliga applikationer på en MySQL- och Linuxplattform med hjälp av Enterprise Architecture Analysis Tool (EAAT) tillsammans med Cybersecurity Modeling Language (CySeMoL). Båda dessa är utvecklade vid avdelningen för industriella informations- och styrsystem (ICS) på KTH. Syftet med denna studie är att validera korrektheten av CySeMoL-verktygets sårbarhetsprediktioner genom att simulera ett antal specifika cyberattacker mot en Linuxplattform. Ett antal vanligt förekommande applikationer på en MySQL-plattform samt två operativsystemstjänster i en Linuxserver modelleras. Penetrationstest utförs därefter för att validera resultaten som simuleras i CySeMoL-verktyget. Studien visar att CySeMols förutsägelser stämmer väl med resultaten av penetrationstesterna.
150

Hur anställda påverkas vid implementering av industri 4.0 i tillverkande företag

Shamorad, Randy, Omar, Beraz January 2021 (has links)
Det blir viktigare för företag att tillämpa lyckade implementeringar på arbetsplatser. Detta för att kunna matcha den ökande standarden som företag ställs inför. Företaget pressas därför från flera olika fronter. Teknologier kan därför implementeras som en del av industri 4.0. Detta för att skapa ökad kommunikation, säkrare arbetsplatser och en bättre arbetsmiljö för den anställde med högre kompetens. Detta samtidigt som det ska vara gynnsamt ekonomiskt. För att behålla sig plats på marknaden krävs därför utveckling. Implementeringar på arbetsplatsen är en typ av utveckling. Implementeringar kräver dock struktur och planering för att uppnå ett lyckat resultat. Frågeställningen blir därmed hur implementeringen av de nya teknologierna påverkar människorna i företaget. Detta då förändringar som sker drastiskt på arbetsplatsen påverka säkerheten för den anställde då struktur och kunskap kan saknas. Företag behöver därför arbeta parallellt och med samspel av andra teknologier för att inte utsätta den anställde för risker. Det finns ett flertal teknologier att tillämpa vid implementering av industri 4.0 som påverkar den anställde. Dessa teknologier påverkar olika aspekter även sammanhängande och bör därför implementeras med samspel. Att skapa fördelar på arbetsplatsen med hjälp av teknologierna som förbättrad kommunikation ger den anställde möjlighet till att kunna ta del av teknologins fördelar vid implementering. Genom studien har slutsatsen dragits att dessa fem aspekter kommunikation, arbetsmiljö, säkerhet, ekonomi, utbildning/kompetens är de viktigaste påverkande på den anställde vid implementering av industri 4.0. Syftet med detta examensarbete är att studera teknologier inom industri 4.0 för att finna dess påverkan på den anställde vid implementering. För att besvara frågeställningen har studien använt sig av sekundärdata som innefattar vetenskapliga artiklar och böcker. Teorierna är analyserade och avgränsades under arbetets gång för att presentera en slutsats på frågeställning.

Page generated in 0.0926 seconds