| |
|
Voice-over-IP principle and security problems
Bořuta, Petr ; Hošek, Jiří (referee) ; Vyoral, Josef (advisor)
This master’s thesis deals with security properties of protocols used for VoIP systems. In the first part, there is a description of most commonly used protocols and structure of VoIP systems. This part also discuss signaling and transport protocols. The second part of this paper describes techniques of ensuring quality of services. The next part presents SIP messages and communication. Last part of this paper overviews security risks of VoIP protocol. Practical part of this thesis describes creation of a testing VoIP network, on which several attacks has been made, fallowed by securing of mentioned VoIP network. Result of this thesis is evaluation of security risks connected to VoIP communication.
|
|
ALTERNATIVE THEMES AND APPROACH: MEDIA ACTIVISM IN THE CZECH MILIEU
Bořuta, Petr ; Láb, Filip (advisor) ; Křeček, Jan (referee)
Bachelor's thesis 'Alternative themes and approach: media activism in the Czech milieu' deals with dissimilar forms of so-called media activism. The main goal of this paper is to describe activities that under comprehensive denotation 'media activism' are aimed at promoting unpopular agenda or alternative approach to social themes and problems in nontradional ways, scilicet in the context of the Czech milieu. The thesis tries to answer the question whether the Czech media activism absorbed the trends from Western Europe countries and the USA or not, prospectively if it drags behind. Another purpose of the thesis is also to discover at what certain extent is media activism influenced by new media and how media activists use them.
|
| |
|
Voice-over-IP principle and security problems
Bořuta, Petr ; Hošek, Jiří (referee) ; Vyoral, Josef (advisor)
This master’s thesis deals with security properties of protocols used for VoIP systems. In the first part, there is a description of most commonly used protocols and structure of VoIP systems. This part also discuss signaling and transport protocols. The second part of this paper describes techniques of ensuring quality of services. The next part presents SIP messages and communication. Last part of this paper overviews security risks of VoIP protocol. Practical part of this thesis describes creation of a testing VoIP network, on which several attacks has been made, fallowed by securing of mentioned VoIP network. Result of this thesis is evaluation of security risks connected to VoIP communication.
|