National Repository of Grey Literature 32 records found  previous3 - 12nextend  jump to record: Search took 0.00 seconds. 
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.
System for anonymous transmit of messages
Kislinger, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Diploma thesis deals with an anonymous transmit of messages using protocol for anonymous authentication. In first part, we introduce theoretical familiarization to the issues and description protocol for anonymous authentication. Further, it describes the suggestion of the communication between the client and the server. Finally, contains a description of the created system for anonymous transmit of messages, which consists of the server and clients, who can leave challenges on the server for other users and they obtains challenges from the server. The thesis explains how to start and control program. There are also discussed methods of computing verification values, encryption keys and messages and authentication of receivers.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.
Program for risk management based on the Annualised Loss Expectancy method
Hlaváček, Jan ; Rosenberg, Martin (referee) ; Burda, Karel (advisor)
The object of this batchelor thesis was to create a program for managing risks by ALE method. The program is used to calculate the ALE in information systems, focus on medium-sized companies.
Privacy protection on the internet
Lučenič, Lukáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
In this bachelor thesis are analyzed social networks and their security, methods of obtaining information from users and examples of Internet crime. The second part describes authentication methods and authentication protocols. The final section describes a principled own proposal anonymous authentication protocol.
Effective Usage of Transmission Equipment in Education process
Rosenberg, Martin ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
The essential goal of my bachelor thesis was to propose effective usage of equipments, which are available for educational process in Accesses and Transports Networks course and elaborate tree laboratory exercises on these devices. All of my developed exercises contain detailed theoretical description, which is focused on actual thesis, layout of the exercise, block diagrams for better understanding of problem and detail instructions for individual measuring. After completion of guide, these exercises were remeasured and exemplary protocol was developed. The first task is processed with analyser PUMA 4300E. The main issue is to introduce the structure of E1 frame and measuring of pulse shape on E1 line to students. The second exercise is focused on analysis a structure of STS-1 frame, which is currently used in SONET networks. This practice is realized on TutorTIMS educational system. The last exercise is running on hardware version of this system, device TIMS 301. The goal is to introduce students the bit clock, regeneration of the bit clock and measuring quality of the bit clock. The last chapter is dedicated to device TIMS 301. The primary purpose of this chapter is to make the usage of the system more effective.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
The analysis of TOR’s hidden service
Mesík, Vladimír ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This work deals with problems concerning anonymity in the internet age, the principle of onion routing, Tor network, Tor’s Hidden Service protocol. Analyzing security, anonymity and the possibility of Hidden Services deanonymisation, revealing the actual IP address of hidden service server. It describes selected types of attacks against Tor network in order to deanonymisation of nodes and hidden services. The practical part describes the process of installing and configuring hidden services under Linux. The final part of the practical part is operational and running .onion hidden service with anonymous service for file storing and sharing. Part of the work is the development of two laboratory tasks aimed at the server configuration and its security.
Security camera system CCTV
Mlčoch, Vladimír ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Nowadays the cameras are an important part of security systems. They are everywhere and affect our lives every day. The task of my bachelor thesis was to learn about this camera system, describe its parts and function as a whole. Understanding the theoretical basics of this issue is crucial for solution of bachelor thesis and the laboratory task. In the first part I focuse on the history and description of older systems and the gradual evolution to the modern ones. The second part analyzes the different components of a CCTV system and try to understand their functionality. In the third part i create laboratory task that aims to teach students about the modern technologies and options used in digital camera systems CCTV.

National Repository of Grey Literature : 32 records found   previous3 - 12nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.