Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.00 vteřin. 
Extended Functionality of Honeypots
Soóky, Peter ; Polčák, Libor (oponent) ; Matoušek, Petr (vedoucí práce)
The bachelor thesis titled Extented functionality of honeypots is dedicated to the development of a specific type of security systems called honeypots. After the introduction of the principles of honeypot systems the work deals with the benefits of their use along with the comparison of such systems to other security systems. Furthermore it describes the classification of honeypots and their characteristics. Another part is concerned with the introduction to CONPOT and GLAFTOPF. The aim of the thesis is to suggest and realize extensions focused on the improvement of the mentioned honeypots. The description of each extension contains the definition and analysis of the given problem, the implementation and evaluation of the recommended resolution. Utilization of the enhancements provide better security while widening their field of use. The conclusion discusses the possibilities of further development of the honeypots.
Security assessment for industrial protocols
Priščák, Jaroslav ; Blažek, Petr (oponent) ; Fujdiak, Radek (vedoucí práce)
This bachelor thesis is focused on security verification of selected protocols used in ICS/SCADA systems. The theoretical part explains the basic principles of the division and management of SCADA systems. Consequently on their communication using protocols (MODBUS, DNP 3, IEC 60870-5-104 and IEC 61850) and their capabilities. In the next chapter, the thesis deals with the analysis of these protocols in terms of security and design methods for their verification. The selected protocols were DNP3 and IEC 60870-5-104, which deal with the work of next parts. Virtualized network, which was simulated using the selected communication protocol DNP3 and IEC 60870-5-104 was created. Subsequently, the security of the protocols was tested using the developed tools and the Kali Linux virtual machine. In the last chapter, the thesis deals with mitigation measures on these created attacks.
Security assessment for industrial protocols
Priščák, Jaroslav ; Blažek, Petr (oponent) ; Fujdiak, Radek (vedoucí práce)
This bachelor thesis is focused on security verification of selected protocols used in ICS/SCADA systems. The theoretical part explains the basic principles of the division and management of SCADA systems. Consequently on their communication using protocols (MODBUS, DNP 3, IEC 60870-5-104 and IEC 61850) and their capabilities. In the next chapter, the thesis deals with the analysis of these protocols in terms of security and design methods for their verification. The selected protocols were DNP3 and IEC 60870-5-104, which deal with the work of next parts. Virtualized network, which was simulated using the selected communication protocol DNP3 and IEC 60870-5-104 was created. Subsequently, the security of the protocols was tested using the developed tools and the Kali Linux virtual machine. In the last chapter, the thesis deals with mitigation measures on these created attacks.
Extended Functionality of Honeypots
Soóky, Peter ; Polčák, Libor (oponent) ; Matoušek, Petr (vedoucí práce)
The bachelor thesis titled Extented functionality of honeypots is dedicated to the development of a specific type of security systems called honeypots. After the introduction of the principles of honeypot systems the work deals with the benefits of their use along with the comparison of such systems to other security systems. Furthermore it describes the classification of honeypots and their characteristics. Another part is concerned with the introduction to CONPOT and GLAFTOPF. The aim of the thesis is to suggest and realize extensions focused on the improvement of the mentioned honeypots. The description of each extension contains the definition and analysis of the given problem, the implementation and evaluation of the recommended resolution. Utilization of the enhancements provide better security while widening their field of use. The conclusion discusses the possibilities of further development of the honeypots.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.