118 results on '"Veber, Jaromír"'
Search Results
2. Produkční a provozní management
- Author
-
Veber, Jaromír and Lenka Švecová
- Published
- 2021
3. Podnikání malé a střední firmy: 3., aktualizované a doplněné vydání
- Author
-
Veber, Jaromír and Jitka Srpová
- Published
- 2012
4. Řízení jakosti a ochrana spotřebitele: 2., aktualizované vydání
- Author
-
Veber, Jaromír
- Published
- 2006
5. Cloud computing services in Czech republic
- Author
-
Veber, Jaromír, Doucek, Petr, Čapek, Jan, Pitner, Tomáš, and Karpeta, Jiří
- Subjects
informační technologie ,management ,Czech Republic ,cloud computing ,Česká republika ,služby ,rozhodování ,services ,decision ,information technology - Abstract
Modern approaches of providing services such as cloud computing are increasingly used worldwide, and it is a promising way to provide information technology services. Cloud computing promises to increase the efficiency of the management of information technology services, optimize costs and also allows rapid deployment of IT services. The aim of this work is to find where to utilize cloud computing services in the Czech Republic, and how. The objectives were realized through research. Subsequently based on the results of this research there is proposed a model for selecting cloud management solutions for businesses in the Czech Republic. Studies were conducted, among others, in form of a questionnaire survey aimed to analyze the current situation and to deliver data for subsequent analysis of the interaction between the factors that may affect the organization during selection of cloud solutions. Further research was focused on the analysis of the conditions of the Czech Republic in terms of cloud computing and to find differences that distinguish the Czech Republic from other countries around the world. The thesis brings realization of the proposed model that will help organizations to decide whether and how to use cloud services, an overview of the current situation and analysis of the specifics that affect cloud services in the Czech Republic.
- Published
- 2009
6. Hodnocení podmínek pro rozvoj cloud computingu v ČR.
- Author
-
Veber, Jaromír
- Subjects
CLOUD computing ,DEPLOYMENT (Military strategy) ,GUIDELINES ,PROBLEM solving ,GOVERNMENT agencies - Abstract
Copyright of Systémová Integrace is the property of Czech Society for Systems Integration and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
7. PROFIL SOUDOBÝCH ŠPIČKOVÝCH MANAŽERŮ.
- Author
-
Veber, Jaromír
- Published
- 2002
8. LZE MĚŘIT KVALITU?
- Author
-
Veber, Jaromír
- Published
- 2002
9. PŘEHLED SOUDOBÝCH MANAŽERSKÝCH KONCEPCÍ.
- Author
-
Veber, Jaromír
- Published
- 2001
10. PŘÍRUČKA PRO EFEKTIVNÍ USKUTEČŇOVÁNÍ ZMĔN.
- Author
-
Veber, Jaromír
- Published
- 2000
11. Analysis of the current state of Internet of things wireless network's and it's future development
- Author
-
Hájek, Daniel, Luc, Ladislav, and Veber, Jaromír
- Subjects
Zigbee ,LoRa ,internet věcí ,iot ,Sigfox ,internet ,wireless networks ,bezdrátové sítě ,internet of things - Abstract
This thesis aims to introduce a phenomenon called the Internet of things (IoT) and its wireless networks, it brings short overview about the topic and it's history. In the next part of the thesis, there is presented a list of currently used wireless networks and they are compared to specialized networks developed for the Internet of things. This part also contains a short analysis of the Internet of things' current network's coverage, the analysis focuses on the countries which are the world's leaders in technology development. These countries are also compared with the Czech Republic. In the practical part of the thesis is introduced a vision of ideal smart house. Afterwards, a project of implementation of smart devices is presented. This project aims at reaching the same attributes as the presented vision. The main part of the project is dedicated to designing a wireless network using the Zigbee standard.
- Published
- 2017
12. Use of Raspberry Pi in the home
- Author
-
Müller, Jan, Luc, Ladislav, and Veber, Jaromír
- Subjects
Pi Zero ,Arduino ,Banana Pi ,Ardduino ,Senzor ,Sensor ,Malina ,Raspberry Pi ,Linux ,Orange Pi ,Raspberry ,Raspbian - Abstract
This work is devoted to description of Raspberry Pi computers, their commissioning and verification of their functionality by the author. The first part deals with the basic introduction of Raspberry Pi single-board computers, the Raspberry Pi Foundation and a short history of computer development. Three competing products of the present time are also described. In the practical part, the author describes how to get the Raspberry Pi computer to work for common computer users using the Raspbian operating system and memory card and everything is validated by the author. In the last phase of the work, the use of Raspberry Pi is described for household monitoring and for monitoring of various variables. The author of this work verifies that by connecting a Raspberry Pi camera module or various sensors such as temperature sensor or motion detection sensor. There will be briefly described other possibilities of using Raspberry Pi computers at the end of the thesis.
- Published
- 2017
13. Securing web applications using the offensive security methods
- Author
-
Avdeev, Vadim, Luc, Ladislav, and Veber, Jaromír
- Subjects
Zabezpečení ,OWASP Top 10 ,Web Application ,offensive security ,webové aplikace ,Security ,Kali Linux - Abstract
This bachelors thesis focuses on the topic of securing web applications using the offensive security methods. The first part aims to present the terminology of the topic, introduce the top ten most critical web application security risks according to OWASP Top 10 2017, then present Kali Linux, its tools and used methods. The practical part aims to perform penetration testing on authors own web application in Kali Linux environment with the use of available automated tools. Results of performed tests are thoroughly covered throughout all phases of testing. Authors recommended solutions for the threats and vulnerabilities discovered.
- Published
- 2017
14. Internet of Things - intelligent housing infrastructure
- Author
-
Vaculová, Kateřina, Luc, Ladislav, and Veber, Jaromír
- Subjects
internet věcí ,infrastructure ,smart home ,chytrý dům ,infrastruktura ,modelová infrastruktura ,inteligentní bydlení ,model infrastructure ,intelligent housing ,Internet of Things - Abstract
This bachelor thesis focuses on the topic of Internet of Things, specifically intelligent housing. The theoretical part consists of introduction of the main automation parts in which you can implement smart devices, basic realization of infrastructure and applications used for maintenance and control. The practical part describes model audiovisual infrastructure draft and possible integration of surveillance camera system. The primary contributions of this paper are introduction of automated home to readers, the most favorite hardware solutions of this concept, model representation of audiovisual infrastructure of smart home and comparison between wired and wireless home automation systems.
- Published
- 2017
15. Web application security testing
- Author
-
Kapal, Martin, Veber, Jaromír, and Luc, Ladislav
- Subjects
bezpečnost webových aplikací ,web application security ,penetration testing ,penetrační testování ,OWASP - Abstract
This bachelor's thesis deals with the topic of web application security. The purpose of the theoretical section is to introduce the problem of web application security in general and highlight the means of exploiting the security vulnerabilities. The next part of this section is dedicated to the Open Web Application Security Project (OWASP) organization, with the primary focus on the OWASP Top Ten Project, describing the ten most critical web application security vulnerabilities. The practical section is about testing the security of the given application using penetration testing. After introducing the application, appropriate testing tools are selected and the testing process is described. Finally, the test results are summarized and all found security weaknesses are fixed.
- Published
- 2017
16. NFC payments using mobile phone
- Author
-
Kalousová, Pavlína, Luc, Ladislav, and Veber, Jaromír
- Subjects
Secure Element ,NFC ,platby mobilním telefonem ,mobile payments ,Host Card Emulation ,Contactless payments ,Bezkontaktní platby - Abstract
This bachelor thesis is focused on the current trend in usability of mobile phones which is paying contactless at merchants using NFC. The beginning of this thesis is aimed at explaining basic terminology, business model, current market share of mobile operating systems and technologies such as NFC, Secure Element, Host Card Emulation and tokenization. This part is followed by categorizing and describing different applications for contactless payments in Czech Republic. These applications can be viewed as applications released by certain banks (bank applications) or by other companies (nonbank applications, often connected to a specific operating system). Part of this thesis is also aimed towards wearables and potential future development regarding contactless payments in Czech Republic. Main goal of this thesis is to analyse different applications based on predetermined criteria. Conclusion of this analysis is used to fulfill the goal of this bachelor thesis which is identifying the most advantageous applications. Last objective of this thesis is to sum up a list of recommendations for potential users to secure their experience.
- Published
- 2017
17. Využití Raspberry Pi jako centrály pro Apple HomeKit
- Author
-
Stibor, Tomáš, Luc, Ladislav, and Veber, Jaromír
- Subjects
ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Arduino ,Homebridge ,iOS ,Apple HomeKit ,Raspberry Pi ,Linux - Abstract
This bachelor thesis is about creating own base for technology called Apple HomeKit. The first part of thesis is about introducing and presenting minicomputer Raspberry Pi, platform Apple HomeKit, platform Arduino and communication protocol MQTT. In the next part there is description about how to set and install Raspberry Pi as a common user. The phase part is about description how to install and set required software on Raspberry Pi. There is an information about setting and programming own sensors (thermometer and humidity sensor) and how to add our base with these sensors into the iOS application called Home. Costs overview is included in this part too.
- Published
- 2017
18. Analysis of wireless network security in home area
- Author
-
Lokvenc, František, Luc, Ladislav, and Veber, Jaromír
- Subjects
bezpečnost ,network device ,platforma ,ochrana ,zabezpečení ,Bezdrátová síť ,platform ,attack ,protection ,safety ,útok ,router ,Wireless network ,Wi-Fi ,security ,síťové zařízení - Abstract
The topic of the bachelor thesis is Analysis of wireless network security in home area. Target of theoretical part is to provide complex information about problematics Wi-Fi, options of security and questions associated with it. Practical part focuses on introducing theoretically threats along with practical examples. In the final phase is the target to make recommendations, introduce settings for end user about security and protect of their own wireless sites.
- Published
- 2017
19. GetSimple content management system security testing
- Author
-
Kadoch, Lukáš, Veber, Jaromír, and Čermák, Radim
- Subjects
web applications ,open-source ,Penetrační testování ,OWASP ,GetSimple ,Penetration testing ,webové aplikace - Abstract
The main aim of this work is to test the security of content management system GetSimple by means of OWASP methodic. The first part is devoted to the theory and clarification of specific terms which are used in the field of web application security. Further on, it introduces a chosen GetSimple system including its parameters and requirements for a host server. The second part contains the penetration testing itself. Each test includes the aim, instructions and in case of discovery of vulnerability a suggestion for improvement. The testing is subject to OWASP methodic standards and it is managed according to the OWASP Top Ten documentation. The added value of this work is finding the security risks of the chosen system.
- Published
- 2017
20. Elektronický mýtný systém
- Author
-
Kotěšovec, Václav, Luc, Ladislav, and Veber, Jaromír
- Subjects
Česká republika ,Czech republic ,toll system ,transport ,mýtný systém ,toll ,doprava ,mýto ,population characteristics ,geographic locations - Abstract
This thesis deals with the functioning of the electronic toll system. The first section describes the electronic fee collection, the architecture of the electronic toll collection system and the EU transport policy. The next section describes the electronic fee collection in the Czech republic and neighbouring countries. As a conclusion is a personal recommendation for a better functioning of the system in the Czech republic.
- Published
- 2017
21. Optimalization of PPC campaign
- Author
-
Shul, Roman, Čermák, Radim, and Veber, Jaromír
- Subjects
PPC ,online marketing ,optimalization ,Google AdWords ,optimalizace - Abstract
The thesis deals with analysis of online marketing, especially PPC advertising. The AdWords system, a platform from Google on which PPC campaigns function on, is described here. The structure and the principle of how these advertisements work are explained in the theoretical part. In the practical part we look into the company McRAI s.r.o., that uses this system for their promotion. Targets, which were determined for their campaign, combine an effort to increase the number of business entities that contact the company through our advertisement and to increase the number of visitors to the company's website. At the end, the PPC advertising is summarized as a whole. There is also mentioned the result we have achieved with our PPC campaigns for our client.
- Published
- 2017
22. Information Security Management System in the company BluePool s.r.o
- Author
-
Menčík, Jan, Veber, Jaromír, and Světlík, Marián
- Subjects
analýza rizik ,ISMS ,risk analysis ,PDCA ,information security ,ISO/IEC 27000 ,informační bezpečnost - Abstract
This master thesis deals with the topics Information Security Management by the group of ISO/IEC 27000 norms and implementation of the Information Security Management System (ISMS) in one particular company. The theoretical part describes the group of norms ISO/IEC 27000 and the legislation and institutions related to these norms. Then the theoretical framework of a risk analysis is introduced. The benefits and possible obstacles when implementing the ISMS in an organization with emphasis on small businesses is described at the end of the theoretical part. The practical part includes a complex risk analysis and measures to be taken for the revealed risks. Furthermore, it involves the settings of the information security internal rules in the company Bluepool s.r.o. with regard to the risk management and information security policy. The conclusion of this part puts forward a proposal of the process and examples of implementation, time schedule and budget for implementation of adopted measures.
- Published
- 2017
23. Methods for identification and preparation of incident solutions caused by malicious software
- Author
-
Bárta, Jan, Veber, Jaromír, and Luc, Ladislav
- Subjects
škodlivý ,malicious ,solution ,řešení ,incident ,bezpečnost ,security ,software - Abstract
This bachelor thesis deals with the description of methods for identification and preparation of incident solutions caused by malicious software, which can be retrieved by its various forms. In the theoretical part, the reader is firstly introduced to the situation before the occurrence of a security incident. Along with this, there are presented currently the most widespread types of malicious software, ways of spreading, its forms and tools for communication with attackers. Then follows initial response to the incident, after that there is described the measurability of security incidents, categorization, classification according to various criteria and determination of safety classes. The practical part, which is dealing with incident solution procedures, analyzes the security incident and explains in details, how to behave in this situation and about what to be aware. For the sake of completeness, the future development of the informatics industry is also mentioned. The aim of this thesis is to create a complex that can be used for example as a supporting material for the incident solutions caused by malicious software, which primarily affects security.
- Published
- 2017
24. Internet of things and navigation applications
- Author
-
Kouba, Václav, Luc, Ladislav, and Veber, Jaromír
- Subjects
smartphone ,síť ,network ,propojení ,smart car ,navigace ,Internet věcí ,iOS ,komunikace ,comunication ,connection ,Android ,chytrý automobil ,navigation ,chytrý telefon ,Internet of things - Abstract
This bachelor thesis is focused on the internet of things and GPS navigation applications. The first part of the thesis consists of theoretical basics to familiarize the reader with the internet of things, its development, areas of use and security. Currently, built in navigation devices and navigation applications in smartphones are used separately, the internet of things is going to change that. In the second part todays GPS navigation applications are analyzed and compared based on the selected criteria and it is verified if the navigation applications for smartphones can replace the built in solution of BMW X5. The applications are compared based on their functions. The aim of this thesis is to analyze each of the selected applications and compare them based on the selected criteria and choose the best replacement for the built in solution until there are combined solutions available with synchronization between the built in navigation system and a navigation application.
- Published
- 2017
25. Analysis of mobile applications and platforms in selected directions
- Author
-
Rákos, Jan, Luc, Ladislav, and Veber, Jaromír
- Subjects
webový prohlížeč ,Windows Phone ,iOS ,mobile navigation ,mobilní navigace ,web browser ,Android - Abstract
This thesis has one secondary and two primary goals. The first primary objective is to analyse the most widely used mobile web browsers and most popular mobile navigation. Applications are evaluated on the basis of defined criteria, which is assigned a weight using the Saaty method of paired comparison. Information obtained from this analysis are used to accomplish the second primary goal. The second primary goal is to analyse the most widely used mobile platforms and find out which platform has available the best navigation and browsers. The secondary objective of this work is to acquaint the reader with the most popular mobile plat-forms. Reading this work will help reader in choosing a mobile navigation, mobile web brows-er or a mobile operating system for his mobile devices.
- Published
- 2016
26. Analysis of the current state of cybercrime in the EU
- Author
-
Veselý, Dominik, Veber, Jaromír, and Luc, Ladislav
- Subjects
kyberkriminalita ,warez ,Social Engineering ,sociální inženýrství ,malware ,cyberbullying ,cybercrime ,kyberšikana - Abstract
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU focuses in its theoretical part on the definition of the term cybercrime. This term is very comprehensive, therefore the vast majority of the paper consists of the variety of forms of cybercrime. There are talking specificaly about attacks againts personal computers and software systems, attacks, that lead up to misuse of computers, datas and other information, breaking the copyright and last, but not least using the computers againts the law. An integral part of the thesis is the current legislation, investigation of a cyber offense and the defense againts cybercrime. And interesting chapter are the trends from the years 2010 to 2016, where I mention the most interesting real-life cases of cybercrime. The main aim of the practical part of the thesis is unification of recommendations and rules concerning the defense againts cybercrime based on my obtained information and experience.
- Published
- 2016
27. Phishing in the gaming industry
- Author
-
Nguyen Van, Thanh, Luc, Ladislav, and Veber, Jaromír
- Subjects
videohra ,scam ,phishing ,game industry ,herní průmysl ,video game ,STEAM - Abstract
This bachelor thesis deals with a currently major issue of cyber security, which is phishing. The study is also specific in that it is focused on the gaming industry, which is subjected to a detailed analysis. The first goal of thesis is to acquaint the reader with problems of security risks of phishing in general and in game related fields. To achieve this goal, in the introduction of the theoretical part of the work, the general problem of phishing with a view on historical development and expansion is presented. Furthermore is described topic of gaming industry, its trends of videogames and security risks of online trading. The second goal is to give future and existing Steam users an overview of common phish-ing attacks and countermeasures. To achieve this goal, in the analytical part of the work, a specific gaming platform in online trading and distribution of game is selected, Steam from Valve. In the practical part of the work, eight selected phishing attacks are conducted to brief analysis and completed into a final evaluation and countermesures of all attacks.
- Published
- 2016
28. Knowledge sharing applications and their safety
- Author
-
Kůrka, Jan, Veber, Jaromír, and Luc, Ladislav
- Subjects
Web Applications ,Zabezpečení aplikací ,Wiki Applications ,penetrační testování ,OWASP ,Application Security ,wiki aplikace ,Penetration Testing ,Webové aplikace - Abstract
The purpose of this bachelor's thesis is to describe security issues of knowledge sharing web applications. Basic terms related to the topic are defined in the theoretical part. Types of tests that can be used to verify safety of the application are described further, followed by introduction of OWASP foundation and their development and documentation projects. The project OWASP Top Ten 2013 informing about the ten most critical security threats to web application is then described in more detail. Finally, theoretical part presents knowledge sharing applications and their best-known open-source representatives. Practical part of the thesis is dedicated to penetration testing the three most widely used wiki applications. A particular testing methodology is presented, including the procedure and the results of the tests themselves. The results are commented and explained in detail and the overall security of every application is evaluated. Contribution of this bachelor's thesis is verification of security in currently most widely used knowledge sharing applications and finding their vulnerabilities. The test results together with the found insufficiencies will be sent to the developers of these applications.
- Published
- 2016
29. Analysis of security access to internet banking via mobile devices
- Author
-
Hiršal, Michael, Veber, Jaromír, and Klíma, Tomáš
- Subjects
TLS ,šifrování ,passwords ,hesla ,access security ,encryption ,mobile devices ,spyware ,mobilní aplikace ,SSL ,mobile applications ,mobilní zařízení ,zabezpečení přístupu - Abstract
The objective of this thesis is to analyze and review external security of mobile applications providing mobile banking on Android operating system. The theoretical section is aimed to describe the prerequisites for security analysis and the technological design of security for this kind of applications. Related practical section is based on the data acquired by the author in which the technological security is examined. Products of the companies Air Bank, a.s. and Moneta Money Bank, a.s. were selected to be examined in the practical section. These two companies are sample of the current Czech bank market. The examined level of security of both of the applications and their comparison are covered in the conclusion of the thesis.
- Published
- 2016
30. Útoky typu odepření služby (denial of service)
- Author
-
Marek, Viktor, Klíma, Tomáš, and Veber, Jaromír
- Subjects
Denial of service attack ,Cyber attack ,Distributed denail of service attack ,Útok typu odepření služby ,DDoS ,Kybernetický útok ,Distribuovaný útok typu odepření služby ,DoS ,InformationSystems_GENERAL ,Software_GENERAL ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING - Abstract
The main objective of this bachelor thesis is an analysis of denial of service attacks and the subsequent simulation of selected denial of service attacks. To achieve the goal of this thesis, the initial point in theoretical part consists of the defined main terms related to denial of service attacks. These terms are: cyber attacks, denial of service attack and distributed denial of service attacks. Further in this part of this thesis is defined description of the person who executes denial of service attacks and motives, which lead the person to these acts. At the conclusion of the theoretical part of the thesis are mentioned several classifications of denial of service attacks. The practical part of the thesis is then focused on the analysis of the most frequent denial of service attacks and their possible defense. Furthemore, this section also includes a general defense against denial of service attacks and the known examples of denial of service attacks younger than two years. Based on the acquired knowledge about the denial of service attacks, is in the conclusion of the practical part of the thesis made simulation of two selected methods of denial of service attacks.
- Published
- 2016
31. E-mailový server a ochrana proti spamu
- Author
-
Kučera, Jan, Luc, Ladislav, and Veber, Jaromír
- Subjects
e-mail address ,testování ,spam ,e-mailová adresa ,testing ,server ,filter ,e-mail ,bezpečnost ,security ,filtr ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING - Abstract
This thesis deals with e-mail server and anti-spam protection. Its content is the presentation of information on various types of spam, anti-spam protection options and principles of e-mail communication. Furthermore, the content of this work is to install and configure e-mail server and test its anti-spam filters. Test results are compared with the results of the free e-mail inboxes. The main goal is to provide readers with comprehensive information on spam issues, and also helping them when making e-mail server on their own. Testing anti-spam protection should offer insight on the quality of the chosen solutions for e-mail server.
- Published
- 2016
32. Internet in Cuba and Censorship
- Author
-
Hořejší, Jan, Veber, Jaromír, and Luc, Ladislav
- Subjects
internet ,censorship ,Cuba ,Internet in Cuba ,cenzura ,Internet censorship ,internet na Kubě ,Internet ,cenzura internetu ,Kuba - Abstract
This paper focuses on issues related to Internet in Cuba, their development, current trends and tendencies and nowadays course of events in the Cuban network also with regard to the United States - Cuban thaw. Further on, the methodology of limiting the access to the open Internet including Internet censorship is explained and the analytical part determines how much freedom of an Internet user in Cuba is actually limited.
- Published
- 2016
33. Security and Risk Analysis in Practice
- Author
-
Calta, Filip, Luc, Ladislav, and Veber, Jaromír
- Subjects
Analýza rizik ,Následek ,ITIL ,Risk ,Zranitelnost ,Vulnerability ,Hrozba ,Risk analysis ,Aktivum ,Ošetření ,Riziko ,Asset ,Threat ,Consequence ,COBIT ,ISO/IEC 27005 ,Treatment - Abstract
This thesis describes issues of risk analysis and security of company assets. Theoretical part of the thesis looks into the terminology of the topic with closer familiarization of procedures that are commonly used in risk analysis solutions and in company information security. Practical part of the thesis is focused on application of risk analysis using ISO/IEC 27005 methods on a concrete company, which is focused on distribution and consultation in the field of audio and video technology business. In risk analysis qualitative methods of valuation are used. An output of the analysis could be seen in added annex. The output of this thesis should be a treatment that shall prevent creation of risks, which had been found in previously defined area. Scope of the study is focused on purchase and sale.
- Published
- 2016
34. Vulnerability assesment tools
- Author
-
Charvát, Michal, Veber, Jaromír, and Klíma, Tomáš
- Subjects
scanning ,Tripwire ,vulnerability ,OpenVAS ,tools analysis ,penetrační testování ,skenování ,MBSA ,řízení zranitelností ,penetration testing ,zranitelnost ,vulnerability management ,analýza nástrojů ,Retina ,Nessus ,GFI LanGuard ,vulnerability assesment ,hodnocení zranitelností ,Secunia - Abstract
This bachelor thesis is focused on a specific area of information systems security, which is called vulnerability assesment. Vulnerability assesment is executed with special tools called vulnerability scanners. In the the beginning of the first part I will introdukce the area of information systems security and its breaf history, the basic terms of vulnerability assesment and related topics, such as penetration testing. In the following part few test will be executed using some of the chosen available and free tools and then analyze its results. The main criteria will be the number and criticality of the given vulnerabilities. Finally the user-friedly aspect of each tool will be evalueted, which could be a little subjective matter.
- Published
- 2016
35. IT risk management in trading company
- Author
-
Pail, Vojtěch, Veber, Jaromír, and Luc, Ladislav
- Subjects
analýza ,informační technologie ,management ,risk ,analysis ,Risk IT ,řízení ,riziko ,ISO/IEC 27005 ,information technology - Abstract
This thesis focuses on IT risk management process. IT risks of trading company are identified by using risk assessment techniques. The risk assessment is conducted according to international standard ISO/IEC 27005 and ISACAs Risk IT Framework. Finally, risks are evaluated and controls are proposed.
- Published
- 2016
36. Spam, risks and countermeasures from the position of selected banking entities od Czech Republic
- Author
-
Kubů, Tereza, Luc, Ladislav, and Veber, Jaromír
- Subjects
spam ,banking entity ,ohrožení ,bankovní subjekt ,spammer ,nevyžádané sdělení ,bezpečnost ,prevence ,threat ,security ,prevention ,unsolicited messages - Abstract
This bachelor thesis focuses on the issue of an unsolicited mail, also known as a spam. Mo-reover, the thesis deals with preventive measures against these spams on the side of banking institutions operating in the Czech Republic.The objective of the theoretical part is to famili-arise a reader with basic characteristics of spam, its development, possible methods of its prevention and risks, which are related to the banking sector. In practical part of the thesis, a reader can find selected banking sectors operating on the Czech market. Those were analysed in the terms of providing adequate and good-quality information about the spam, its possible security risks and the security features of the internet banking. The outcome of the analysis is the evaluation of the quality of preventive steps of the Czech banks against the unsolicited mail.
- Published
- 2016
37. Analysis of modern payment methods
- Author
-
Klimeš, Martin, Matuštík, Ondřej, and Veber, Jaromír
- Subjects
mobilní platby ,closed loop ,NFC ,kritické faktory úspěchu ,mobile payments ,critical success factors ,platební metody ,payment methods ,contactless payments ,cloud ,bezkontaktní platby - Abstract
This bachelor thesis is focused on the modern payment methods, which has nowadays became one of the most popular and used form of paying. The aim of this work is to formalise an analysis of modern payment methods and define its factor of successes. The bachelor thesis is being divided into several chapters. The first chapter is sourced from (available) written literature, highlighting the main definitions, focusing on the given topic in general but also briefly describes the historical points of view on it and the theoretical methods of critical success factors. The next chapter describes payment methods, which are being used nowadays, then focuses on the analysis of payment methods it self. Methods that are new, modern and innovative in different forms. Each method gives the basic information, function, security, typical situation and advantages and disadvantages of different forms of modern payment methods. Through this analysis we can determine the factors of success of payment methods and creates a discussion, which will result into a summary of factors that should improve and help with the development of the new payment methods. The last chapter contains selected forms of payment methods tested in real conditions.
- Published
- 2016
38. Malware, hrozba internetu - typy a ochrana
- Author
-
Vaňková, Aneta, Luc, Ladislav, and Veber, Jaromír
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,malware ,antivirový program ,worm ,spyware ,vir ,backdoor ,virus ,červ ,antivirus ,adware ,Trojan horse ,trojský kůň - Abstract
This bachelor thesis deals the world malware and what this word means. The theoretical part describes the particular division of malware, its history and development from the 70s to the present. Other chapters include targets of hackers, why malware exists and what is the motivation of its authors. Conclusion of the theoretical part describes other threats which are on the Internet. The practical part includes two explorations. The first is dedicated to antivirus, it represents the most frequently used programs, their functionality and user interface. Test of infected file demonstrates the functionality and level of security. Final summary assists users in selecting the appropriate antivirus for their computer. The second is realized as a questionnaire which determines the awareness of the general public about the danger of malware and defence against it. The conclusion evaluate results of explorations of the practical part, it compares targets of this bachelor thesis and monitors their achievement or provides information about extension of explorations.
- Published
- 2016
39. Digitální forenzní věda a její aplikace při forenzním auditu účetnictví
- Author
-
Martinka, Jan, Doucek, Petr, and Veber, Jaromír
- Subjects
Fraud examination ,Analýza účetních dat ,Procesní rámec ,Forenzní audit ,Process framework ,Vyšetřování podvodu ,Accaunting data analysis ,Forensic audit ,Digital forensics ,Digitální forenzní věda ,ComputingMilieux_COMPUTERSANDSOCIETY ,ComputingMilieux_LEGALASPECTSOFCOMPUTING - Abstract
This thesis aims to describe a process framework suitable for conducting digital forensics investigation projects as support for forensic audit. Selection of existing digital forensics investigation framework was a subject of criterial comparison. Described new framework is a result of combination and enhancement of those frameworks, which were suitable for the characteristics of forensic audit. Thesis also discusses digital forensics methods for fraud examination and risk assessment as a part of external audit.
- Published
- 2015
40. Analysis of deal-of-the-day services market from the viewpoint of security
- Author
-
Maskaliunets, Stanislau, Veber, Jaromír, and Luc, Ladislav
- Subjects
šifrování ,web applications ,certificate ,cryptography ,attacks ,útoky ,slevové portály ,certifikát ,bezpečnost ,webové aplikace ,HTTPS ,security ,deal-of-the-day services - Abstract
In this bachelor thesis I analyze the market of deal-of-the-day services from the viewpoint of security. First of all, I describe the security of the information systems as a term. I also explain the methods of securing web applications. Web applications run on HTTP protocol, and the more secure web applications use the HTTPS protocol, which contains the TLS/SSL. In this work I describe working principle of HTTP protocol. I also describe the SSL/TLS protocols and methods of their acquiring. In the theoretical part, I also describe the methods of cryptography. In the practical part, I describe the methods of defense against attacks and analyze the deal-of-the-day services. I describe the evolution of both the world and Czech deal-of-the-day services. At the end, I analyze deal-of-the-day websites security and compare the results of this analysis.
- Published
- 2015
41. Vulnerability Management in the Corporate IT Infrastructure
- Author
-
Hronek, Tomáš, Veber, Jaromír, and Klíma, Tomáš
- Subjects
tools comparison ,Tripwire ,vulnerability ,kritičnost ,OpenVAS ,soulad s bezpečnostní konfigurací ,severity ,Retina ,zranitelnost ,Nexpose ,security configuration compliance ,řízení zranitelností ,vulnerability assessment ,expozice ,vulnerability management ,srovnání nástrojů ,Nessus ,CVSS ,hodnocení zranitelností ,exposure - Abstract
The present thesis deals with the area of vulnerability management and its relation to information security. Its main purpose is to set the topic of vulnerability management in context of company information security and to explain its relationship to related disciplines. In the practical part, selected vulnerability assessment tools are compared and methodology is applied to determine the criticality of the vulnerabilities identified in relation to the provided IT services. The objectives were achieved by literature review, personal consultations with employees responsible for information security at J&T Bank and by comparing the results of several tools for assessing vulnerability (Nessus, Retina, OpenVAS, Nexpose, Tripwire). To date, there has not been published a thesis devoted exclusively to the topic of vulnerability management. This thesis is the first one to provide comparable results of vulnerability scanning of the same targets. Equally valuable is the application of Common Vulnerability Scoring System to determine the criticality of the vulnerabilities identified in relation to delivered IT services.
- Published
- 2015
42. Optimalizace práce s DOM
- Author
-
Mironov, Nikita, Veber, Jaromír, and Luc, Ladislav
- Subjects
DOM ,JavaScript ,rendering engine ,optimization ,optimalizace ,renderovací jádro ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,ComputingMethodologies_GENERAL - Abstract
The thesis's main theme is comparison of different approaches of work with DOM API. The aim of the theoretical part of the thesis is explanation of the most popular web browsers' architectures and their inner components. Also, thesis describes the DOM standard and most common optimizations.
- Published
- 2015
43. Bitcoin
- Author
-
Herzán, Jiří, Klíma, Tomáš, and Veber, Jaromír
- Subjects
virtuální měna ,cryptography ,miner ,blockachin ,blockchain ,bitcoin ,kryptografie ,ASIC ,virtual currency ,proof-of-work ,peer-to-peer ,pool ,cloud mining ,InformationSystems_DATABASEMANAGEMENT - Abstract
Bachelor's thesis is focused on crypto currency bitcoin. The thesis is divided into three parts. First chapter is focused on cryptography, which is used for bitcoin security. Next chapter describes basic bitcoin principles and bitcoin mining. In last chapter there are practically described two methods of bitcoin mining. The aim of this thesis is to bring coherent view on given themes, especially bitcoin mining. The main goal of this thesis is trying bitcoin mining using ASIC miner and Cloud mining method. The result is a statement about mining profitability.
- Published
- 2015
44. Web Application Security Testing and implementation of fixes
- Author
-
Doležal, Ondřej, Veber, Jaromír, and Klíma, Tomáš
- Subjects
web ,testing ,penetrační testování ,owasp ,bezpečnost ,php ,web aplikace ,web develop - Abstract
The main objective of this bachelor thesis is to introduce the topic of web security as the part of development. This thesis mentions the most critical web application security risks and tools which developers may use to test such risks. Another objective of the thesis is to introduce a web application which this author co-developed and which is the subject of security testing and following implementation of fixes.
- Published
- 2015
45. Metody a nástroje malwarové analýzy
- Author
-
Danilov, Marcel, Luc, Ladislav, and Veber, Jaromír
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software_OPERATINGSYSTEMS ,malware ,dynamická analýza ,dynamic analysis ,statická analýza ,tool ,technique ,keylogger ,static analysis ,nástroj ,metoda - Abstract
This bachelor thesis adresses present day topic of broad interest, the topic of malware. This term stands for malicous software as viruses, worms, trojans, spyware etc. Simply put a software with intent to do harm to the users of computers or mobile devices, to their steal information or gain access to their private computer systems. This thesis is divided into several chapters. First few of them are theoretical. First one describes malware in general. It defines what malware is and divides it into categories. Second chapter introduces a discipline of malware analysis. A discipline where malware, its components and behaviour is analysed in laboratory environment. This chapter contains general description of malware analysis, categories in which is this analysis divided, and rules of said analysis. Third chapter goes even further into malware analysis. It describes and identifies its indiviual techniques and tools. Last chapter is focused on practical usage of malware analysis. Theoretical knowledge of malware analysis, specifically knowledge of tools and techniques described in previous chapters is demonstrated on real, live example of malware. Thanks to demonstration of tools and techniques; funcionality, structure and life cycle of mentioned piece of malware is also being analyzed. Goal of this thesis is to bring reader closer to the topic of malware, with emphasis on area of malware analysis. This contains an explanation what an malware analysis is, what is its purpose. Next goal is to develop a summary of malware analysis basic tools and techniques. Thesis contribution is application of knowledge of techniques and tools on real malware analysis. With the help of malware analysis, this thesis demonstrates its individual tools and techniques on live example of malware. Other contributions are deriving from analysis itself. Funcionality, structure and life cycle of analysed piece of malware is also being explained.
- Published
- 2015
46. Security risks of smartphones
- Author
-
Káňová, Eva, Luc, Ladislav, and Veber, Jaromír
- Subjects
Průzkum ,Smartphone ,Operating system ,Operační systém ,Chytrý mobilní telefon ,Windows Phone ,iOS ,Antivirus ,Research ,Survey ,Protection of data ,Antivirový program ,Bezpečnost ,Security ,Ochrana dat ,Android - Abstract
The topic of this bachelor's thesis is security and protection of data by using smartphones. The theoretical first part focuses on history of smartphones and introduces the best-known operating systems. The second part describes attacks on mobile phones, their future and the most famous attacks. Another section contains methods, which protect smartphones against attacks. Next part focuses on the comparison of antivirus program, according to specific criteria. The last part contains description of my survey. The goal of this survey is to find an answer to the question, if people care about the protection of data and realize the consequences of no good protection.
- Published
- 2015
47. Anonymization on the Internet with focus on the end user
- Author
-
Řapek, Lumír, Klíma, Tomáš, and Veber, Jaromír
- Subjects
anonymita ,doplňky prohlížeče ,browser extensions ,soukromí ,privacy ,plug & play devices ,anonymity ,plug & play zařízení ,anonymization ,VPN ,anonymizace - Abstract
The Bachelor thesis deals with anonymization on the Internet with focus on the end user. The theoretical part describes information and tracks which user leaves behind while using the Internet. Attacks and threats which may endanger the user's anonymity are also discussed. The practical part is focused on easily available forms of anonymization. For this reason, the first part contains the description and multi-criteria comparison of anonymization extensions for web browsers which allow at least change of IP address. The second part contains the description and comparisons of two plug & play devices that also provide relatively easy way of anonymization.
- Published
- 2015
48. Requirements analysis and design of registration IS - case study
- Author
-
Adámek, Vlastimil, Oškrdal, Václav, and Veber, Jaromír
- Subjects
sběr požadavků ,requirement ,registration information system ,projektový manažer ,informační systém ,správa požadavků ,requirements analysis ,information system ,katalog požadavků ,requirements management ,requirement catalog ,požadavek ,gathering requirements ,project manager ,analýza požadavků ,evidenční informační systém - Abstract
The main goal of this thesis is to create a catalog of requirements for registration information system for a large security company. The thesis is compile as a guide for the selection of possible solutions to the problem arising from the absence of information registration system and the transition to record data in electronic form also known as a paperless concept. The secondary objective is to introduce best practices for requirements management. The theoretical part consists of six main chapters. First introduces the basic concepts. As I consider the most important part of the next chapter dealing with the demands, with an emphasis on the importance of requirements. At the same time in this chapter will try to fulfill the secondary goal. Easily describe the role of project manager and an analysis based on the findings of the current situation of enterprises in the Czech Republic regarding IT. The final part of the theoretical part is based on the performance of the most basic methods of data collection requirements. The practical part is based on information from the theoretical part, knowledge of the educated subjects and experience of working as security guard. It is carefully selected and suitable method for gathering requirements, and this choice is explained in detail. After analyzing the requirements is made requirements catalog, which is the output of the whole work. Constructing a catalog of requirements is thus completed the first phase of project planning, and to collect and analyze requirements. Output of the thesis can be used for the second phase and system development.
- Published
- 2015
49. Censorship of internet in Russia
- Author
-
David, Jakub, Veber, Jaromír, and Klíma, Tomáš
- Subjects
Web ,Rusko ,Cenzura ,Bezpečnost ,Proxy ,Censorship ,Internet ,Security ,Russia - Abstract
The target of the thesis to reveal how much is possible to find out the truth about sensitive governmental topics from Russian mass media. In thesis will be compared results from Google and another search engine with results from another countries where that search engines is located. The thesis will be supported by citizen of Russian Federation and employee of anti propagandistic department in Brussels. Theoretical part of thesis will be dealing with censorship on the internet in general and ways how it could be realized. In thesis will be outline opportunities how censorship could be ignored. In practical part will be compared results from Russian search engine with Czech and another theirs American and European versions. Trough tracing will try to find out where exactly come about blocking of data retrieval and handling with results in case it will be manifested
- Published
- 2015
50. Malware - rizika a protiopatření
- Author
-
Hejduk, Jakub, Luc, Ladislav, and Veber, Jaromír
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,malware ,antivirus protection ,antivirová ochrana ,computer safety ,počítačový vir ,computer virus ,počítačová rizika ,trojan horse ,computer threats ,trojský kůň ,ochrana počítače - Abstract
This bachelor's thesis addresses the issue of a threat in the area of computers and internet networks, malware. It defines what malware is, its various types and the history in terms of occurrence and actions. It also provides the reader with insight into malware's functionality and how it threatens users. Furthermore, the thesis contains examples of some current well-known threats. A dossier on antivirus and antispyware software is also included. It is essentially a summary of their functions, properties, benchmark results and a list of countermeasures it equips the user with. The last section of the theoretical part of the thesis is a prediction of the future regarding the evolution of these threats and how will they affect the user. A considerable part of this work is a survey providing a summary of the current level of malware knowledge among people. I intend to determine if people are aware of these threats, their ability to defend themselves against them and also whether they already encountered this issue and if so, how did they handle it. This thesis should increase awareness about malware to make people understand what it is capable of in the environment of an unsecured computer. Ultimately, I am going to present the results of the survey and evaluate the depths of knowledge about malware among people.
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.