• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 10
  • 2
  • Tagged with
  • 60
  • 44
  • 34
  • 31
  • 24
  • 20
  • 15
  • 13
  • 13
  • 12
  • 11
  • 11
  • 11
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Posouzení a návrh informační bezpečnosti v organizaci / Assessment and a Proposal for Information Security in the Organization

Rybáková, Alena January 2015 (has links)
This diploma thesis deals with the issue of information security in the organization. Author's effort is to gain a broad overview of connections, which will then be evaluated in the final section, providing concrete recommendations. In this thesis it is discussed information security management system, service management system and cyber security, both in theory and in terms of real application in a particular organization. The aim is to provide own recommendations for improvement.
22

Blockchain v národní bezpečnosti / Blockchain in National Security

Pavliv, Katerina January 2020 (has links)
The given work is dedicated to the provision of the evaluation on the effectiveness of Blockchain if applied within national security. The research is done through the summative evaluation approach, which allows to estimate the studied phenomenon in one realm in terms of its level of usefulness and transfer the findings to the framework of the thesis on the basis of the main methodological hypothesis. The research comprises the analysis and evaluation of the Blockchain environment, levels of operation, existing normative clash, the componential issues of the latter, provision of the final perspectives of the potential incorporation of the Blockchain technologies into national security with the discussion on the possible application, benefits of the platform, its social and technical vulnerabilities, and limitations.
23

Nepoučitelní uživatelé: příčiny (ne)bezpečných hesel / Careless society: Drivers of (un)secure passwords

Nedvěd, Vojtěch January 2021 (has links)
Careless Society: Drivers of (Un)Secure Passwords Thesis abstract Vojtěch Nedvěd May 2, 2021 Vulnerabilities related to poor cybersecurity are a dangerous global economic issue. This thesis aims to explain two examples of poor password management. First, why users use similar password and username and second, why they reuse their passwords, as the main drivers of this behaviour are unknown. We examined the effects of selected macroeconomic variables, gender, password length and password complexity. Additionally, this thesis suggest how to estimate sentiment in passwords using models build on Twitter posts. The results are verified on large password data, including password leaks from recent years. There are four main findings. First, a higher cybersecurity index and diversity of a password seem to be related to the lower similarity between a username and a password. Second, it seems that there are structural differences between countries and languages. Third, the sentiment seems to be a significant determinant too. Fourth, password reuse seems to be positively affected by the cybersecurity level. The thesis contributes to the study of password management. It proposes how to model the relationship, derive the data, split the passwords into words, model the sentiment of passwords, what variables might be...
24

Kyberterorismus a digitální pirátství / Cyberterrorism and digital piracy

Knopová, Martina January 2011 (has links)
The thesis "Cyberterrorism and digital piracy" deals with the description of aims, motivation, tools, and consequences of current cyberwars. First of all, it concentrates on features of cyberconflicts while trying to indentify and define the essence of cyberterrorism, its principles, causes, and threats. Besides a description of common cyberwar methods, it provides a reader with a detailed analysis of the "Information Assurance" concept, which represents a form of strategy used to define risks of information security in the cyberspace. The analytic part of the thesis concerns concrete cases of the international cyberterorism and its forms in the 2007 to 2010 cyberwars. It also analyses some particular cyberattacks from the geopolitical point of view in a chronoligical way, especially those that happened in the European-Russian, Asian-American and Middle-Eastern regions. The comparation of the theoretical "Information Assurance" model and partial analyses of individual cyberwar examples has showed that not to keep the model reasons in the real disruption of the information security for a particular system. This fact notably contributed to the inception of aforementioned cyberconflicts, therefore the validity and applicability of the Information Assurance" concept the has been proved.
25

Nový MHP rámec pro kybernetickou válku / New IHL Framework for Cyber Warfare

Knopová, Eva January 2016 (has links)
NEW IHL FRAMEWORK FOR CYBER WARFARE - ABSTRACT Regarding the increasing number of revealed cyber-attacks aimed at public facilities including the governmental ones by who seems to be other state actors, this thesis aims to reveal the major importance of cyber warfare, point out the fatal vacuum regarding the IHL framework currently in force and suggests its completion by a new IHL convention, which would regulate cyberwarfare in International Armed Conflicts. In order to provide a well-structured and pertinent arguments to support its main points, the thesis uses methods of qualitative analysis of the current IHL sources including international treaties, customary law and work of the main institutions of international justice along with work of judicial scholars and cyber experts. The work contains five main chapters. The first chapter presents the underlining principles of Laws of Wars, including its theory, history and development; and focuses on one of its three main regimes - the International Humanitarian Law. The second part is dedicated to the topic of cyber warfare, defines its scope as computer network attacks, explains their classification system, analyses their effects and provides examples of such attacks. The third chapter focuses on the issue of the current legal vacuum in relation to cyber...
26

Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategies

Jandura, Lukáš January 2016 (has links)
The thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible. Powered by TCPDF (www.tcpdf.org)
27

Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategies

Jandura, Lukáš January 2016 (has links)
The thesis is focused on central nodes' dynamics in cyberspace, representing its key elements. This approach is derived from the theory of networks developed by Albert-László Barabási and applied on different aspects of cyberspace, which brings different views at known events and issues and discovers relationship between central and common nodes. Cyberspace is perceived in its broadest shape as a fluid result of social constructivism influenced by behaviour of its users. Final outcomes are summarised to recommendations for a new approach to a cybersecurity strategy. Powered by TCPDF (www.tcpdf.org)
28

Evropská právní úprava kyberzločinů s porovnáním právní úpravy kyberzločinů ve Spojených státech amerických / European legal regulation of cybercrimes in a comparison with the legal regulation of cybercrimes in the USA

Nováčková, Eliška January 2015 (has links)
6 Abstract Thesis title: European legal regulation of cybercrimes in a comparison with the legal regulation of cybercrimes in the USA The diploma thesis deals with the legislation of cybercrime and cyber security of the United States of America and the European Union. The introduction defines the basic concepts and important moments of history of related legislation and discusses key policy documents adopted in the transatlantic area. It also presents the politics of these two units and their key legislation and describes the international Convention on Cybercrime. Selected documents are subsequently compared and evaluated in the context of legal terminology, technological development and application of regulations in practice. The thesis is concluded by the basic steps of transatlantic cooperation on issues of cyber security. The conclusion summarizes the lessons learned by comparing documents, particularly international emphasis on ratification of the Convention on Cybercrime and adequate levels of awareness of cyber space, and highlights some terminological inaccuracies. Keywords Cyber threats * cyber security * cybercrime * international cooperation * strategic documents
29

Promotion of regional development in South Africa through increasing level of cyber security

Haas, Michal January 2016 (has links)
Topic of this diploma thesis is focused on cyber security situation in African Union particularly in South Africa looking and analyzing the legislative background of African Union and South Africa after introduction of African Union Convention on Cyber Security and Personal Data Protection. Legal background supported on continental level and governmental level should point on importance of this topic and encourage states bodies for action. Analysis and comments on legal aspects, suggestions and regulations introduced in the Convention together with practical examples from global environment and South Africa as well will point on opportunities in regional development consiting in this topic. In suggestion part is proposed Cyber Security Concept that is transferring general articles from African Union Convention into short guide with comments on ratified content by Member States of African Union, reviewing those points wirh our related topic and filling up missing parts based on experiences from European Union.
30

Právní rámec vyšetřování počítačové kriminality / Legal framework of computer crime investigation

Rademacherová, Kristina January 2016 (has links)
Master's thesis is focused on computer crime, with an emphasis on the process of investigation. New systematics in Czech computer crime terminology is offered. Within the thesis, cybercrime is perceived as a part of computer crime. Special attention is put on various aspects of criminalistics, as the topic of investigation itself is understood from the point of view of such science. Nevertheless, criminological findings are discussed likewise. Particular emphasis is put on a link between Czech legal regulation and expert literature from the fields of law, criminalistics, criminology and technology. Master's thesis is based on Czech literature, as well as English and French writings, in addition to national and international case law. The text itself is divided into three chapters. First chapter is introducing the issue of computer and cybercrime with selected criminological characteristics, including specifics of offending within the Internet. Second chapter discusses evidence of computer crime, the electronic or digital evidence, from the point of view of criminalistics. Particular problems of digital evidence usage within Czech criminal procedure are revealed. The core of master's thesis is the third chapter. Methodology of computer crime investigation is discussed, as well as selected individual...

Page generated in 0.0567 seconds