Computer criminality prevention methods
Show simple item record
dc.contributor.advisor |
Jašek, Roman
|
|
dc.contributor.author |
Mlček, Viktor
|
|
dc.date.accessioned |
2010-07-13T13:25:02Z |
|
dc.date.available |
2010-07-21T08:57:02Z |
|
dc.date.issued |
2006-05-26 |
|
dc.identifier |
Elektronický archiv Knihovny UTB |
cs |
dc.identifier.uri |
http://hdl.handle.net/10563/638
|
|
dc.description.abstract |
Tato diplomová práce se zabývá současnými počítačovými hrozbami, bezpečnostními situacemi a riziky, hrozícími počítačovým systémům, jakož i metodami prevence těchto hrozeb. Problematiku přibližuje ze strany správce informačních technologií a systémů malé firmy a jejích uživatelů, čímž může oběma skupinám pomoci při prevenci mnoha dnešních bezpečnostních rizik. |
cs |
dc.format |
76 s. |
cs |
dc.format.extent |
2030911 bytes |
cs |
dc.format.mimetype |
application/pdf |
cs |
dc.language.iso |
en |
|
dc.publisher |
Univerzita Tomáše Bati ve Zlíně |
|
dc.rights |
Práce bude přístupná pouze v rámci univerzity od 26.05.2008 |
|
dc.subject |
analysis
|
en |
dc.subject |
antivirus
|
en |
dc.subject |
AV protection
|
en |
dc.subject |
system
|
en |
dc.subject |
attack
|
en |
dc.subject |
attacker
|
en |
dc.subject |
authentisation
|
en |
dc.subject |
authentification
|
en |
dc.subject |
certificate
|
en |
dc.subject |
cracker
|
en |
dc.subject |
cipher
|
en |
dc.subject |
cryptoanalysis
|
en |
dc.subject |
cryptography
|
en |
dc.subject |
data
|
en |
dc.subject |
data protection
|
en |
dc.subject |
decrypting
|
en |
dc.subject |
digital signature
|
en |
dc.subject |
e-mail
|
en |
dc.subject |
encryption
|
en |
dc.subject |
firewall
|
en |
dc.subject |
hacker
|
en |
dc.subject |
modification
|
en |
dc.subject |
protocol
|
en |
dc.subject |
risk
|
en |
dc.subject |
security
|
en |
dc.subject |
signature
|
en |
dc.subject |
spam
|
en |
dc.subject |
threat
|
en |
dc.subject |
Trojan
|
en |
dc.subject |
virus
|
en |
dc.subject |
worm
|
en |
dc.subject |
analýza
|
cs |
dc.subject |
antivir
|
cs |
dc.subject |
antivirová ochrana
|
cs |
dc.subject |
systém
|
cs |
dc.subject |
autentizace
|
cs |
dc.subject |
autentifikace
|
cs |
dc.subject |
bezpečnost
|
cs |
dc.subject |
certifikát
|
cs |
dc.subject |
cracker
|
cs |
dc.subject |
červ
|
cs |
dc.subject |
data
|
cs |
dc.subject |
dešifrování
|
cs |
dc.subject |
digitální podpis
|
cs |
dc.subject |
e-mail
|
cs |
dc.subject |
firewall
|
cs |
dc.subject |
hacker
|
cs |
dc.subject |
hrozba
|
cs |
dc.subject |
kryptoanalýza
|
cs |
dc.subject |
kryptografie
|
cs |
dc.subject |
modifikace
|
cs |
dc.subject |
ochrana dat
|
cs |
dc.subject |
protokol
|
cs |
dc.subject |
riziko
|
cs |
dc.subject |
signatura
|
cs |
dc.subject |
spam
|
cs |
dc.subject |
šifra
|
cs |
dc.subject |
šifrování
|
cs |
dc.subject |
trojský kůň
|
cs |
dc.subject |
útok
|
cs |
dc.subject |
útočník
|
cs |
dc.subject |
virus
|
cs |
dc.title |
Computer criminality prevention methods |
cs |
dc.title.alternative |
Computer criminality prevention methods |
en |
dc.type |
diplomová práce |
cs |
dc.contributor.referee |
Rosman, Pavel |
|
dc.date.accepted |
2006-06-07 |
|
dc.description.abstract-translated |
This master thesis describes present computer threats, security situations and risks threatening to computer systems, but it also describes common threat-prevention methods. It shows these problems and questions by view of an IT and systems administrator from small company and also of its employees, so it is possible to help both of them with the prevention of many those-days risks. |
en |
dc.description.department |
Ústav aplikované informatiky |
cs |
dc.description.result |
obhájeno |
cs |
dc.parent.uri |
http://hdl.handle.net/10563/77
|
cs |
dc.parent.uri |
http://hdl.handle.net/10563/220
|
cs |
dc.thesis.degree-discipline |
Informační technologie |
cs |
dc.thesis.degree-discipline |
Information Technologies |
en |
dc.thesis.degree-grantor |
Tomas Bata University in Zlín. Faculty of Applied Informatics |
en |
dc.thesis.degree-grantor |
Univerzita Tomáše Bati ve Zlíně. Fakulta aplikované informatiky |
cs |
dc.thesis.degree-name |
Ing. |
cs |
dc.thesis.degree-program |
Engineering Informatics |
en |
dc.thesis.degree-program |
Inženýrská informatika |
cs |
dc.identifier.stag |
3420
|
|
dc.date.assigned |
2006-02-14 |
|
utb.result.grade |
B |
|
local.subject |
zabezpečení počítačových sítí
|
cs |
local.subject |
počítačová kriminalita
|
cs |
local.subject |
computer network security
|
en |
local.subject |
computer crimes
|
en |
Files in this item
This item appears in the following Collection(s)
Show simple item record
Search DSpace
Browse
-
All of DSpace
-
This Collection
My Account