Možnosti zlepšení strategií pro kybernetickou bezpečnost
The potential improvement of the cyber security strategies
diplomová práce (OBHÁJENO)
Zobrazit/ otevřít
Trvalý odkaz
http://hdl.handle.net/20.500.11956/83006Identifikátory
SIS: 180384
Kolekce
- Kvalifikační práce [18079]
Autor
Vedoucí práce
Oponent práce
Schmidt, Nikola
Fakulta / součást
Fakulta sociálních věd
Obor
Bezpečnostní studia
Katedra / ústav / klinika
Katedra mezinárodních vztahů
Datum obhajoby
7. 9. 2016
Nakladatel
Univerzita Karlova, Fakulta sociálních vědJazyk
Čeština
Známka
Velmi dobře
Klíčová slova (česky)
Kyberprostor, uzly, vazby, centra, kybernetická bezpečnost, kybernetická obrana, bezškálové sítě, decentralizace, strategie kybernetické bezpečnosti, bezpečnost, bezpečnostní studia, BarabásiKlíčová slova (anglicky)
Cyberspace, nodes, links, cybersecurity, cyberdefence, scale-free networks, decentralization, cybersecurity strategy, security, security studies, BarabásiThe thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible.
The thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible. Powered by TCPDF (www.tcpdf.org)