• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 3
  • 2
  • Tagged with
  • 56
  • 46
  • 25
  • 23
  • 21
  • 21
  • 21
  • 20
  • 19
  • 16
  • 14
  • 12
  • 11
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Antivirová ochrana počítače z bootovacího úložiště / Antivirus protection of a computer from a boot repository

Mlejnek, Jiří January 2012 (has links)
ABSTRACT Theme of the thesis is the design method of anti-virus protection with the use of an alternative boot store. Processed is a related issue of viruses and the possibility of defenses against them. This thesis is focused on the design and selection of components solutions enabling the execution of antivirus test from the undistorted by the operating system. With selected components continues to realize an alternative booting the operating system from a Windows platform computer network with automatic virus checking of all local disks. The results of inspection are transmitted using signed files on a network server and typically give an overview of the results of the individual tests.
22

Systém pro analýzu dat z infikovaných počítačů / System for Analysis of Data From Infected Computers

Pečeňa, Jan January 2011 (has links)
Presented thesis aims to develop web-based application for AVG Technologies. The application is supposed to bring in every suspicious information from a file, which has been gained from customer's registers, and make customer support more effective and efficient. Designing the application was tightly binded with obtaining an overview of computer threats and attacks. The thesis describes and explains malware and its basic types such as virus, worm, trojan horse, etc. History and features of ASP.NET, PHP, Virus Total web service and Internet Information Service are described as well. The result of the thesis, the application itself, is deployed in real enviroment and ready to be updated with new information sources.
23

Židovský extremismus jako hrozba pro Izrael / Jewish Extremism as a Threat to Israel

Vrbová, Marie January 2012 (has links)
This thesis deals with the impact of the activity of settlement movement Gush Emunim on the internal and external security of the state Israel. The theory of the authors Gabriel Almond, Emmanuel Sivan and R. Scott Appleby is applied. According to this theory it is possible the settlement movement to identify as the movement trying to change the majority society by its activities in the way that the society would act in favour of the goals of the movement. The means, which Gush Emunim tries to reach its goal, are identify by the application of the theory. After that these means are analysed form the point of their impact on the internal and external security of Israel.
24

Analýza vybraných případů kyberkriminality ve finanční sféře / Analysis of specific cases of cybercrimes in the financial sector

Skřivánková, Klára January 2011 (has links)
The thesis deals with the issue of currently most frequent cyber attacks apperaring in the financial sector, that do not aim to fraud financial institutions, but particularly target their clients, average Internet users. The highest attention is deserved to fraud emails -- as known as phishing. The other types of internet frauds and scams, such as Nigerian email scams or the Zeus virus, are not omitted. In the document is presented textual and pictorial guide, which contents a list of warning signs, that helps common Internet user identify and reveal email fraud. The multicriterial analysis evaluates the level of education and awareness, that selected financial institutions provide to their clients using the official web sites. In the last chapter are suggested recommendations and advices leading to increase availability, clearness and quality of information regarding internet frauds and financial threats.
25

Analýza rizik v obci s rozšířenou působností Horšovský Týn a následná metodická pomoc starostům obcí ve správním obvodu tohoto území / Risk analysis in the municipality with extended competence Horšovský Týn and subsequent methodological assistance to the mayors of municipalities in the administrative district of this territory

GERMANOVÁ, Anastázie January 2018 (has links)
The thesis deals with the risk analysis in the administrative district of municipality with extended competence Horšovský Týn. Its aim is to analyse anthropogenic and biogenic hazards on the territory of the municipality with extended competence Horšovský Týn and to create a practical aid for mayors of municipalities for dealing with an emergency. The theoretical part defines the basic powers and duties of the municipal authorities in the field of security and crisis management. Furthermore, it defines the theoretical bases for the analysis of risks, especially the definitions of the concepts and the characteristics of the various available methods. In the practical part, a specific risk analysis for the area of the administrative district of the municipality with extended competence Horšovský Týn is carried out by expert assessment method. It includes a detailed characterization of the territory in terms of administrative distribution, demography, climatological and hydrological conditions, infrastructure, etc. Furthermore, the risk rates for individual events are then calculated and compared to each other. Based on the results of the analysis, the mayors of the municipalities are suggested of security measures. The risk analysis for the territory of the municipality with extended competence Horšovský Týn serves as a basic entry into the processes of emergency and crisis planning in this area. The methodical aid, which will be handed over to the mayors of individual municipalities, will contribute to the preparedness for dealing with extraordinary events and crisis situations in the territory of the municipality with extended jurisdiction Horšovský Týn. The thesis can serve as a teaching material in the field of public security.
26

Aplikace metod BCM do havarijního plánování / Application of methods of BCM into emergency planning

Cihlářová, Aneta January 2009 (has links)
Enterprises during their operation are impacted many threats and risks that could dramatically affect their business. Business Continuity Management has evolved to provide resistance against the eternal operational risks. BCM aims to ensure business continuity in case of its danger. The goal of this thesis is to apply the selected methods of the BCM into emergency planning, which is regulated by legislatively for businesses in the Czech Republic.
27

Využití SIEM systémů při monitorování síťových událostí / Utilization of SIEM systems for network events monitoring

Kopřiva, Milan January 2015 (has links)
In the last years we can observe an increasing number of security incidents varying in their focus, motives and success rate. Attacks are often conducted by very skilled organized groups with high knowledge base and they are increasing in their sophistication and efficiency. Because of those reasons information security is now one of the main fields of interest of IT experts. This thesis deals with Security information and Event Management technology and its usage for the detection of potentially harmful activity in a company's internal network. In the first chapter the elementary concepts of security are placed into the context of this thesis. Next chapter deals with security information and event management technology itself, its clear definition and describing the main functionality. The end of the theoretical part is dedicated to the author's view of the future and also to the problems concerning the implementation of SIEM solutions including return on investment calculation which has certain specifics in security field. Main benefit coming from this thesis is a clear description and creation of use cases aimed at the detecting suspicious activity in internal computer networks combined with their deployment in SIEM solution in real environment. The practical part of this thesis is dedicated to the configuration of the chosen device and its connection to the SIEM solution, and the assessment of usability of security events generated by the threat detecting device. Based on this assessment the use cases will be modelled and then deployed in the test environment. This thesis aims to bring on overall view into the security information and event management technology, starting with its definition and base functions. The primary goal of this thesis is use case designing for real time threat detection in a practical environment.
28

Kybernetická bezpečnost: vztah USA a Číny / Cyber Security: US - Chinese Relations

Debnárová, Barbora January 2015 (has links)
This diploma thesis deals with cyber relation of the United States of America and the People's republic of China. The aim of this diploma thesis is to answer the following questions: What kind of cyber threat for the United States does China represent? How is China's cyber strategy characterised? How do USA react on this threat and what are the gaps in this reaction? The thesis is divided into four chapters. The first chapter deals with definition of cyberwarfare and its perception in Chinese context. The second chapter analyses USA - China relation and its implication for cyber security. The third chapter represents US reaction on Chinese cyber threat. The last chapter deals with the gaps in the reaction. Keywords USA, China, cyber threat, cyberwarfare, cyber espionage
29

Zahálení a trest: psychologická studie lenosti / Loafing and punishment: psychological study of laziness

Polák, Jakub January 2010 (has links)
Contrary to our intuitive expectations about a positive group influence on human performance behaviour, there is a vast body of literature proving the opposite. All the research is based on findings of Max Ringelmann who more than 120 years ago proved in the oldest social psychological experiment ever known that people cooperating on a common task tend to exert less effort than what would be their potential. This performance decrement is caused by coordination losses which relate to the very principles of a team work as well as motivation losses. Because of the tendency of people to limit their effort in collective settings the newly discovered phenomenon has been called social loafing. A group influence on individual's performance became also a main subject of this diploma thesis. Compared to a majority of research dealing with the same topic the present one employs a completely new type of interactive task which involves an intensive cooperation of all group members. We have used in our experiment an original simulation where players are in a role of top management in one movie production company and their goal is to make a strategic decision based on the information distributed among all the team members that will bring them the biggest profit. Consequently we have directly analysed behaviour of...
30

Úkoly Krajského ředitelství Policie ČR vyplývající z Krizového plánu kraje / The tasks of Regional Directorate Police Czech Republic resulting from the crisis plan of the region

PETŘÍK, Jindřich January 2016 (has links)
In the practical part I have proposed an emergency plan for the Regional Police Directorate of South Bohemia (RPD). The main question was: "what are the potential threats to (i) building (ii) day-to-day operations of the Directorate?" The question was addressed through an expert research and security inspection of the building; identified threats were analysed and an adequate security measures were proposed in the concluding paragraph.Some threats were taken from the Emergency Plan of South Bohemia, some of the other security documentation that establishes a Regional Police Directorate of the South Region. In another part of the Plan of emergency preparedness are contained details of the processor and its activities, which in the case of the RPD of the South Bohemian region only to protect internal security and public order in the region

Page generated in 0.0705 seconds