National Repository of Grey Literature 31 records found  beginprevious20 - 29next  jump to record: Search took 0.01 seconds. 
Interception and recording of telecommunications.
Lovíšková, Zuzana ; Říha, Jiří (advisor) ; Gřivna, Tomáš (referee)
This diploma thesis deals with the issue of wiretapping and interception of telecommunications pursuant to Section 88 of the Czech Criminal Procedure Act. It deals also with the question of the so called metering which is governed by a separate Section within the Czech Criminal Procedure Act, Section 88a. The main purpose of this thesis is to provide thorough analysis of these two legal issues, taking into consideration domestic, international and partially also foreign legal provisions. This thesis is systematically divided into three main chapters which offer sequential elaboration on domestic, "European" and Slovak legislation. Each of these chapters is split into several separate parts. In Chapter One, I outline concept, major principles and procedure applying to wiretapping and interception of telecommunication on one hand, and concept, major principles and procedure applying to metering on the other hand. Issue of application of wiretap and interception of telecommunication obtained from foreign authority, as well as question of usage of acquired e-mail content are dealt with in two separate parts of this chapter. Moreover, I focus on utilization of the intercepted wiretap, in case it has been procured by a private individual. Second Chapter is dedicated to help the reader understand the...
Wiretapping and recording of telecommunications in protecting the economy
Velíšek, Roman ; Uhlík, Milan (advisor) ; Pavla, Pavla (referee)
This diploma thesis is focused on telephone tapping and recording of telecommunication traffic in order to protect the economy, according to the criminal procedural institutes: the tapping and recording of telecommunication traffic and survey on information about telecomunication traffic. These institutes are ruled by the act no. 141/1961 Coll., on criminal court proceedings (criminal code), as amended. The aim of this work is to investigate the effectiveness of the use of eavesdropping and records of telecommunication operations, carried out for a longer period in accordance with the criminal procedure code, international treaties and the Police of the Czech Republic in order to protect the individual areas of the economy.
Intercept of the Modern Cryptographic Protocols
Halinár, Petr ; Košař, Vlastimil (referee) ; Kaštil, Jan (advisor)
This paper discusses the security-set used in communication networks. It contains a brief overview of the protocols and architecture description of public keys. Deals in detail with a description of certificates, their backgrounds and SSL protocols. It also represents a number of security shortcomings of these protocols and application design for the interception of HTTPS. Also the results of experiments with this application are stated.
Implementation of Network Security Algorithms in Home Router
Procházka, Tomáš ; Novotňák, Jiří (referee) ; Košař, Vlastimil (advisor)
This bachelor thesis briefly describes minimalist linux distribution OpenWRT and its installation in Linksys WAG160Nv2 router. It describes a selected router and it discusses a measuring procedure of a throughput, wich was chosen as a criterion for an evaluating the performance of the router. Furthermore, it examined the performance of the router using the original system and running OpenWRT. Design and implementation of interception algorithms, whose main purpose is to capture network traffic on the router, are described in the subsequent parts. Results are presented in the final part.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Security of the RFID Technology
Bořutík, Stanislav ; Bartoš, Václav (referee) ; Bartoš, Pavel (advisor)
This paper is about security of the RFID systems, attacks on them and countermeasures. Attack to obtain secret key from Mifare Classic card was implemented. Options for eavesdropping RFID communication, security of the NFC technology and biometric passports are descibed too.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
Internet communication risks
Štěrba, Radek ; Jeřábek, Jan (referee) ; Polívka, Michal (advisor)
This work deals with problems of communications protocols and servers. Primarily protocols TCP/IP are described. Next four the most used IM protocols (account of log in, communications and security) are described. Protocols for voice communications and problems of software phone systems are described here. Also database systems especially LDAP are mentioned here. A practical working is a part of this work too – a putting server for voice communications and sending messages and database LDAP into service. The process for putting the servers into service, connecting competent clients, and last but not least communications with LDAP are described.
System for testing the robustness of communication unit LAN of remote data acquisition
Mlýnek, Petr ; Zeman, Václav (referee) ; Mišurec, Jiří (advisor)
Remote data collection systems are widely used. One of the area is also data collection in energetics, where the energy consumption can be collected daily and presented to users on-line. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the electrometers. The data transmission over the Internet can be subject of various attacks, which is the disadvantage. The understanding of attack method is the most important thing. The protection against the hackers is not complicated, but requires lot of attention. This master's thesis is focused on testing security of the communication unit LAN of remote data acquisition against attacks from the Internet. The next aim of this thesis is to describe algorithm of particular attack, needed recourses for their realization and method of their measurement and evaluation. Communication unit and component composition for attacks simulation is described in the first part of this thesis. The next part is focused on scanning for hosts and ports. The main part of this thesis is focused on the denial of service attacks and man in the middle attacks. In the end of my thesis is described selection of cryptographic system for remote data acquisition and is showed possibility of authentication mirroring. Problems of physical security are described too. The result of this thesis is script implementing all attacks, which are described.

National Repository of Grey Literature : 31 records found   beginprevious20 - 29next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.