National Repository of Grey Literature 255 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Low-level data reading from computer data storages
Šalko, Jaroslav ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The following work is topically focusing on data restore of selected memory devices. It could be divided into two theoretical parts and one practical. The first part consist explanation of these memory media’s structure, the mechanism of their storage and also how operating system approaches these data. This relates also to a file system, which is among with its most commonly used types described there as well. In the second theoretical part the study focuses on the storage damage problematics. Various types of damage are shown and I examine how we could approach them. The work concentrates on possibilities which owners of the damaged storage media have with an emphasis on specialized companies. Therefore the study contains brief information of four selected domestic companies which are offering data restore on the Czech market. The complete list of services, which these companies offer to their customers, is shown in the chart found by the end of chapter. The second option in order of solving media damage problems are freeware programmes. On the basis of an internet poll dealing with the topic „best programmes for data restore“, I have chosen three programmes to be examined. The examination consisted of uploading certain files on the media storage which was formated by high level method afterwards. Through these three programmes I tried to restore the lost data. The results are included in a chart found by the end of each sub-chapter. The practical part of my work deals with linux program for data restore DDrescue. My effort consists of developing and creating an user friendly interface with intuitive manipulation of this helpful tool. My goal is thus spreading this program into the public and providing them simple tool for efficient low-level data restore.
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Strong Cryptography on Smart Cards
Konečný, Jakub ; Burda, Karel (referee) ; Malina, Lukáš (advisor)
The diploma thesis is focused on cryptography with smart cards. It describes smart cards from hardware and software side. The thesis compares well known operating systems used on smart cards. Specified operating systems are widely analyzed. There is introduction to password authenticated key establishment protocols. PACE protocol is described in details together with implementation proposal. The implementation on the Basic card platform follows. In the end there is the time analysis of the implementation and further improvements are suggested.
Antivirus protection of a computer from a boot repository
Mlejnek, Jiří ; Malina, Lukáš (referee) ; Burda, Karel (advisor)
ABSTRACT Theme of the thesis is the design method of anti-virus protection with the use of an alternative boot store. Processed is a related issue of viruses and the possibility of defenses against them. This thesis is focused on the design and selection of components solutions enabling the execution of antivirus test from the undistorted by the operating system. With selected components continues to realize an alternative booting the operating system from a Windows platform computer network with automatic virus checking of all local disks. The results of inspection are transmitted using signed files on a network server and typically give an overview of the results of the individual tests.
Payment system for Android operating system
Iľko, Pavol ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
The introductory part of this thesis deals with the information (current payment systems, data security, computer attacks) that provide the theoretical framework needed for further practical task. Further on, the detail description of ACP protocol is offered. The work primarily focuses on the proposal of payment system based on ACP protocol. Lastly, some of the difficulties that occur when implementing such application are outlined.
Software support of teaching of cryptography protocols
Marek, Tomáš ; Lambertová, Petra (referee) ; Burda, Karel (advisor)
Document contains informations about authentication, encryption, data integrity and data authenticity. Next part includes description of well know cryptography protocols, their functions and also their weaknesses. All of these acquired informations were used in concept and final software support for teaching of cryptography protocols, which is able to run on clasic web-browser. Thats why the application was designed as web PHP pages using JavaScript and AJAX, which ensures plaform and OS architecture independency. Besides the descripted and ilustrated part of application there are also interactive parts and animations. The last period contains description of education software and its functions. Source code can be found on the appended CD.
Evaluation of entropy sources in common computers
Bafrnec, Matúš ; Zeman, Václav (referee) ; Burda, Karel (advisor)
This thesis is focused on entropy sources and their evaluation. It includes a brief introduction to the information theory, description of entropy sources, their parameters and characteristics and methods of evaluation based on the NIST organisation standard SP 800-90B. The following part of the thesis is dedicated to the description of two created programs and evaluation and comparison of entropy sources. Additionally, the last part describes the usage of hash functions in association with entropy sources.
Secure Network Based on Virtual Next-Generation Firewall
Varmus, Pavol ; Burda, Karel (referee) ; Malina, Lukáš (advisor)
The bachelors thesis aims to study the issue of security of the networks that use firewalls. The next goal is to evaluate the characteristics of a different types of firewalls and to summarize its results. The other object is to design a small or medium sized network with description of best practice. The main objective of the thesis is to design a lecture task for students to test with a step-by-step solution. This task is for students to undertand the importance of firewalls as a network protection service tools and to try out different types of filters for maintainin network security. The task ends with a practical stress test made by a network attack in order to see its resistance to the attack.
Security of keyless systems in cars
Semančík, Matej ; Burda, Karel (referee) ; Krajsa, Ondřej (advisor)
This thesis deals with car remote keyless systems, analysis of these systems and most common attacks on these systems. It also deals with design and realisation of secure car remote keyless system, which should be resistant to said attacks, and with design and realisation of attack against existing car remote keyless system.
Tools for analyzing security protocols
Duchovič, Adam ; Burda, Karel (referee) ; Pelka, Tomáš (advisor)
This thesis is focused on tools which are used to analyzed security protocols. In the beginning of the thesis key goals of security protocols are mentioned and also basic attacks on them are illustrated. Subsequently basic verification techniques, specification languages and verification tools are described. Next part of thesis contains description of protocols in common syntax. Then the main standards used for evaluation of information security products are mentioned. In the end of thesis two well-known verification tools – AVISPA and Scyther - are described and compared to designed methodology of comparing verification tools and their outputs.

National Repository of Grey Literature : 255 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.