National Repository of Grey Literature 99 records found  beginprevious90 - 99  jump to record: Search took 0.02 seconds. 
Metrics for Buffer Overflow Attacks Detection of UDP Network Services
Šulák, Ladislav ; Ovšonka, Daniel (referee) ; Homoliak, Ivan (advisor)
This bachelor thesis deals with problematic of network attacks and their detection in network traffic. The aim is to propose such collection of metric, that will describe network traffic according to its behaviour, and will be capable of detection of Zero-Day attacks as well. Following part of this thesis is to implement a tool for metric extraction.
Safety risks of current routers
Bubelíny, Peter ; Vymazal, Michal (referee) ; Vychodil, Petr (advisor)
The thesis aims to study and document the problem router security. It present the characteristic information about a router, functions, types and locations in a computer network. Because router is integrated part of network, next are described the most commonly types of attacks and generally available security technologies. The thesis also offers insight into the router as a safety device in the role of the throat network, part of the deeper security infrastructure or access point in wireless networks. Next are described the selected security technologies against some of already mentioned attacks and also are offered opportunities to improve safety router. The next are demonstrated DoS and brute-force attacks on router in ethernet network and attacks based on sniffing packets on router in wireless network. Finally, the results are presented.
The Implementation of ISMS in Small Company Focused on ICT
Kosek, Jindřich ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The diploma thesis is focused on the design implementation of information security management system in a small business and is applying theoretical knowledge to real-life situations in a manufacturing company. First of all is performed analysis of current status and the consequent threats which can affect the company's assets. Thereafter are proposed measures based on identified risks and requirements of the owner.
Implementation Methodology of Network Security in the Software Company
Tomaga, Jakub ; Sopuch, Zbyněk (referee) ; Sedlák, Petr (advisor)
This thesis deals with network security and its deployment in the real environment of the software company. The thesis describes information management framework with a specific concentration on computer networks. Network security policy is designed as well as network infrastructure modifications in order to increase the level of security. All parts of the solution are also analyzed from financial point of view.
Application for monitoring and controlling the security of large LAN and WAN computer networks
Maloušek, Zdeněk ; Polívka, Michal (referee) ; Novotný, Vít (advisor)
Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is often stored only in electronic devices and that is why the security of the data is so important. The objective of my thesis is to describe network security problems and their solutions. First chapter deals with the network security, security checks and attacks. It describes procedures used in practise. First part deals with traffic scanning and filtering at various layers of the TCP/IP model. Second part presents the types of proxy and its pros and cons. Network Address Translation (NAT) is a favourite technique of managing IP addresses of inside and outside network which helps to improve the security and lower the costs paid for IP addresses. NAT description, IPSec, VPN and basic attacks are described in this section. The second chapter of the thesis presents set of Perl scripts for network security checking. The purpose of the project is not to check the whole network security. It is designed for contemporary needs of IBM Global Services Delivery Centrum Brno. The first script checks running applications on target object. The aim is to detect services that are not necessary to run or that are not updated. The second one checks the security of the Cisco device configuration. There is a list of rules that has to be kept. The third script inspects the Nokia firewall configuration which is on the border of IBM network. If some of the rule is broken, it shows the command that has to be proceeded at the particular device. The output of the first and the second script is an HTML file. The third script uses the command line for the final report. The last part of this chapter gives advice to configure Cisco devices. It is a list of security recommendations that can be used by configuring e.g. routers. The appendix presents two laboratory exercises. The aim is to give students an opportunity to learn something about programs and technologies which are used in practise by IT experts to check the weaknesses of their networks.
Building and use of small computer networks
Nepomucký, Pavel ; Pinkas, Otakar (advisor) ; Šmejkal, Ivo (referee)
The thesis deals with design of small home network. The main goal is to describe extending home network by new network components, which allow users in specific areas to use newly created wireless connection. The thesis is split into two parts. The first one is given for explanation of network components and their comunication. Second one describes practical demonstration of extending home network by a new component providing wireless conection. The thesis decribes a selection and analysis of network components including setting up, coverage and communication between each access point.
Building and use of small computer networks
Pecka, Jiří ; Pinkas, Otakar (advisor) ; Palovský, Radomír (referee)
The thesis deals with a new design for the home network according to the given requirements of its users. The main aim is to describe how the network can be expanded to include other elements to allow users to access the Internet, data storage and other services via wireless networks in selected locations. The thesis it divided into three parts. The first part describes the previous state of the network and users' requirements for improvements. The second part describes the network and device settings. The third part is devoted to the network testing, including evaluation of the signal strength of access points in all areas of the selected sites and attack simulation on the access point.
The use of honeypots in the school network
Osmík, Lukáš ; Pavlíček, Luboš (advisor) ; Beneš, Jiří (referee)
The thesis deals with issues of honeypots. The first section explains what honeypots are and their use. Next I focus on their classification according the different aspects. Then I describe the advantages and disadvantages of these tools. Besides there are described some specific solutions. The last chapter of theoretical part summarizes the projects dealing with this issue. The second part of this work deals with the deployment of honeypots inside the school's network. In this part I describe a configuration of specific solutions. Then there are summarized the results of the data collected by honeypots and the last chapter describes how these data could be used at school.
Company network security monitoring
Kališ, Martin ; Pavlíček, Luboš (advisor) ; Matuška, Miroslav (referee)
Main focus of this work is on computer network security monitoring. In first part basic definitions for the area are formed and it also offers different ways to encompass monitoring into company security. Next part defines main functions of monitoring systems and provides guidelines for its implementation in organization. Practical part consists of defining key conditions for selection of monitoring solution and it also applies them when comparing several products available on the market. Then it presents author's view on future trends and development in this area based on facts from previous chapters. Whole work provides complete approach to security monitoring and offers definition of all key concepts and competencies for monitoring systems.
Methods for maintaining state information in the HTTP protocol
Polsemov, Anton ; Pinkas, Otakar (advisor) ; Šváb, Ondřej (referee)
This bachelor thesis is focusing on HTTP protocol, its features, and technological aspects. The HTTP protocol is stateless so it is necessary to search for methods to keep status information. These methods are cookies, URL query, session id, http authentication, hidden fields in forms, IP address and additional. Every method has its own strong and weak features. Security of these methods influences a final resolution. Ahead of description of the methods, the thesis is concerning cryptography a describing HTTP cookies in detail. The practical section contains an analysis of online banking in Czech Republic and characterization of trends in this brand. Also, an installation of a PHP5, HTTP Apache server, creation and signification of an OpenSSL certificate is in the last chapter and finally, a simple application of online Banking is created.

National Repository of Grey Literature : 99 records found   beginprevious90 - 99  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.