National Repository of Grey Literature 32 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
The analysis of TOR’s hidden service
Mesík, Vladimír ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This work deals with problems concerning anonymity in the internet age, the principle of onion routing, Tor network, Tor’s Hidden Service protocol. Analyzing security, anonymity and the possibility of Hidden Services deanonymisation, revealing the actual IP address of hidden service server. It describes selected types of attacks against Tor network in order to deanonymisation of nodes and hidden services. The practical part describes the process of installing and configuring hidden services under Linux. The final part of the practical part is operational and running .onion hidden service with anonymous service for file storing and sharing. Part of the work is the development of two laboratory tasks aimed at the server configuration and its security.
Security camera system CCTV
Mlčoch, Vladimír ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Nowadays the cameras are an important part of security systems. They are everywhere and affect our lives every day. The task of my bachelor thesis was to learn about this camera system, describe its parts and function as a whole. Understanding the theoretical basics of this issue is crucial for solution of bachelor thesis and the laboratory task. In the first part I focuse on the history and description of older systems and the gradual evolution to the modern ones. The second part analyzes the different components of a CCTV system and try to understand their functionality. In the third part i create laboratory task that aims to teach students about the modern technologies and options used in digital camera systems CCTV.
High-speed data transmission in mobile and wireless networks
Rosenberg, Martin ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
The goal of the master’s thesis was to propose two laboratory exercises, integrating newly purchased devices HTC Desire and Nokia N900. Designed tasks bring new technologies and services to education process. The first task examines the configuration of branch exchange Asterisk PBX and analyzes SIP protocol. Part of exercise is concentrated on high-speed data transmission in mobile and wireless networks, regarding to usability of VoIP technology. The second exercise introduces to vulnerability of VoIP technology. It contains simulations of attacks on branch exchange Asterisk, DoS attack and discusses methods to secure VoiP communication. The part of this exercise examines usage of HTC Desire phone, instead of ordinary Wi-Fi access point.
The analysis of modern cloud solutions
Kis, Matej ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This thesis describes existing cloud storage systems. Description of the prerequisites of developing cloud and distributed systems are presented. Current storage systems such as Dropbox, iCloud and Google drive are described. Description is mainly focused on the resources of both protocols and derive a conclusion for the use in the cloud storage systems. The practical part of this work is focused on creating two labs, what will be implemented in the teaching syllabus of Projecting, Administration and Security of Computer Networks subject. The first of the labs is focused on the implementation of own cloud services. In the last lab students attention will concentrate on interception of communication secured with SSL protocol.
Using of the attack "Pass the hash attack" for the compromising of high privileged accounts.
Jakab, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The master thesis deals with the attack "‘pass the hash"’ on high privileged accounts. Within the theoretical part is discussed creating hashes and its use. Next is a descrip- tion of the authentication in Windows operating system. There are also pointed out weaknesses in the design of authentication mechanisms. The last part deals with the individual attack and security options for mitigating the impacts. In the practical part are tested available tools for retrieving hashes from the files of the operating systems and tools which allow the attack itself. The output of this section is selection of the appropriate tools to demonstrate the attack in a proposed real environ- ment. The last topic is about designing the experimental environment, demostration of the attack with the possibility of getting through the network. The last steps deal with mitigating the impact of the attack.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Program for risk management based on the Annualised Loss Expectancy method
Hlaváček, Jan ; Rosenberg, Martin (referee) ; Burda, Karel (advisor)
The object of this batchelor thesis was to create a program for managing risks by ALE method. The program is used to calculate the ALE in information systems, focus on medium-sized companies.
Privacy protection on the internet
Lučenič, Lukáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
In this bachelor thesis are analyzed social networks and their security, methods of obtaining information from users and examples of Internet crime. The second part describes authentication methods and authentication protocols. The final section describes a principled own proposal anonymous authentication protocol.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
The analysis of TOR’s hidden service
Mesík, Vladimír ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This work deals with problems concerning anonymity in the internet age, the principle of onion routing, Tor network, Tor’s Hidden Service protocol. Analyzing security, anonymity and the possibility of Hidden Services deanonymisation, revealing the actual IP address of hidden service server. It describes selected types of attacks against Tor network in order to deanonymisation of nodes and hidden services. The practical part describes the process of installing and configuring hidden services under Linux. The final part of the practical part is operational and running .onion hidden service with anonymous service for file storing and sharing. Part of the work is the development of two laboratory tasks aimed at the server configuration and its security.

National Repository of Grey Literature : 32 records found   previous11 - 20nextend  jump to record:
See also: similar author names
4 Rosenberg, Michal
4 Rosenberg, Milan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.