National Repository of Grey Literature 31 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Forensic Analysis of Anonymization Principles of Cryptocurrency Networks
Hromada, Denis ; Zavřel, Jan (referee) ; Veselý, Vladimír (advisor)
Při diskusích o kryptoměnách je častým tématem anonymita. Tato práce se věnuje stavebním blokům kryptoměny Bitcoin a jak na ni navazují kryptoměny jako Ethereum a Dash. Dále popisuje, jak a kde se v minulosti i přítomnosti v kryptoměnových sítích ztrácí soukromí a anonymita. Prvně se zaměřuje na anonymitu, respektive její nedostatky v samotném distribuovaném bloko-řetězu. Práce popisuje efekt znovu-využívání adres a shlukovací heuristiku založenou na společných vstupech transakce. Analyzuje je a popisuje nedokonalé aktuální řešení. Dále se práce zaměřuje na anonymitu mimo bloko-řetěz. Tedy na podpůrné služby, které jsou nedílnou součástí funkce kryptoměnových sítí jako jsou kryptoměnové peněženky. Práce diskutuje úschovu klíčů, různé druhy peněženek a jak komunikují s kryptoměnovými sítěmi. Následuje návrh modelu útočníka, jež je schopen odposlouchávat komunikaci uživatele kryptoměnové peněženky. Avšak nedokáže ji měnit. Jsou popsány vlastnosti, schopnosti a očekávaná úskalí takového útočníka. Poté práce věnuje pozornost třem kryptoměnovým peněženkám: Trezor Suite, Ledger Live a Electrum Wallet. Na těchto peněženkách demonstruje výše zmiňované vlastnosti kryptoměnových peněženek v praxi. Na základě všech těchto informací je navržena a implementována aplikace, jež je schopna napomoci uživateli určit, zda zachycený síťový provoz obsahuje komunikaci generovanou kryptoměnovou peněženkou. Nakonec je implementovaná aplikace podrobena testům. Výstupem těchto testů je, že za pomoci implementované aplikace je možné určit, jaká kryptoměnová peněženka byla použita. A to za předpokladu, že zachycený provoz obsahuje komunikaci, jež peněženky generují při jejich prvotním zapnutí. Následuje vyhodnocení práce a její další možné rozšíření.
Fiber optic infrastructure security
Děcký, Martin ; Dejdar, Petr (referee) ; Münster, Petr (advisor)
This bachelor thesis addresses the problem of security risks of optical fiber infrastructures from the perspective of modification detection. In the first part, the properties of optical fiber, information transmission in optical networks and individual elements of optical infrastructures are theoretically described. The next part is devoted to methods of measuring optical paths and attacks in them. In the last part, the risks of these attacks are analyzed and selected methods for modification detection are validated.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
Intercept of the Modern Cryptographic Protocols
Halinár, Petr ; Košař, Vlastimil (referee) ; Kaštil, Jan (advisor)
This paper discusses the security-set used in communication networks. It contains a brief overview of the protocols and architecture description of public keys. Deals in detail with a description of certificates, their backgrounds and SSL protocols. It also represents a number of security shortcomings of these protocols and application design for the interception of HTTPS. Also the results of experiments with this application are stated.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
System for testing the robustness of communication unit LAN of remote data acquisition
Mlýnek, Petr ; Zeman, Václav (referee) ; Mišurec, Jiří (advisor)
Remote data collection systems are widely used. One of the area is also data collection in energetics, where the energy consumption can be collected daily and presented to users on-line. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the electrometers. The data transmission over the Internet can be subject of various attacks, which is the disadvantage. The understanding of attack method is the most important thing. The protection against the hackers is not complicated, but requires lot of attention. This master's thesis is focused on testing security of the communication unit LAN of remote data acquisition against attacks from the Internet. The next aim of this thesis is to describe algorithm of particular attack, needed recourses for their realization and method of their measurement and evaluation. Communication unit and component composition for attacks simulation is described in the first part of this thesis. The next part is focused on scanning for hosts and ports. The main part of this thesis is focused on the denial of service attacks and man in the middle attacks. In the end of my thesis is described selection of cryptographic system for remote data acquisition and is showed possibility of authentication mirroring. Problems of physical security are described too. The result of this thesis is script implementing all attacks, which are described.
Implementation of Network Security Algorithms in Home Router
Procházka, Tomáš ; Novotňák, Jiří (referee) ; Košař, Vlastimil (advisor)
This bachelor thesis briefly describes minimalist linux distribution OpenWRT and its installation in Linksys WAG160Nv2 router. It describes a selected router and it discusses a measuring procedure of a throughput, wich was chosen as a criterion for an evaluating the performance of the router. Furthermore, it examined the performance of the router using the original system and running OpenWRT. Design and implementation of interception algorithms, whose main purpose is to capture network traffic on the router, are described in the subsequent parts. Results are presented in the final part.
Security of the RFID Technology
Bořutík, Stanislav ; Bartoš, Václav (referee) ; Bartoš, Pavel (advisor)
This paper is about security of the RFID systems, attacks on them and countermeasures. Attack to obtain secret key from Mifare Classic card was implemented. Options for eavesdropping RFID communication, security of the NFC technology and biometric passports are descibed too.
Leakage of information through active and passive elements in optical fibre infrastructures
Spurný, Vladimír ; Horváth, Tomáš (referee) ; Münster, Petr (advisor)
This bachelor thesis deals with the problem of information leakage from optical fiber infrastructures, both from the fibers themselves and from passive and active elements. The first part is devoted to a theoretical description of the transmission of information over an optical fiber and the function of individual components. The next part is focused on the theoretical analysis of possible information leaks. In the last - practical part, there will be an examination of some of the previously described possibilities of information leakage with subsequent analysis and a proposal for risk minimization.
Internet communication risks
Štěrba, Radek ; Jeřábek, Jan (referee) ; Polívka, Michal (advisor)
This work deals with problems of communications protocols and servers. Primarily protocols TCP/IP are described. Next four the most used IM protocols (account of log in, communications and security) are described. Protocols for voice communications and problems of software phone systems are described here. Also database systems especially LDAP are mentioned here. A practical working is a part of this work too – a putting server for voice communications and sending messages and database LDAP into service. The process for putting the servers into service, connecting competent clients, and last but not least communications with LDAP are described.

National Repository of Grey Literature : 31 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.