National Repository of Grey Literature 32 records found  beginprevious21 - 30next  jump to record: Search took 0.00 seconds. 
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.
Security camera system CCTV
Mlčoch, Vladimír ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Nowadays the cameras are an important part of security systems. They are everywhere and affect our lives every day. The task of my bachelor thesis was to learn about this camera system, describe its parts and function as a whole. Understanding the theoretical basics of this issue is crucial for solution of bachelor thesis and the laboratory task. In the first part I focuse on the history and description of older systems and the gradual evolution to the modern ones. The second part analyzes the different components of a CCTV system and try to understand their functionality. In the third part i create laboratory task that aims to teach students about the modern technologies and options used in digital camera systems CCTV.
Effective Usage of Transmission Equipment in Education process
Rosenberg, Martin ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
The essential goal of my bachelor thesis was to propose effective usage of equipments, which are available for educational process in Accesses and Transports Networks course and elaborate tree laboratory exercises on these devices. All of my developed exercises contain detailed theoretical description, which is focused on actual thesis, layout of the exercise, block diagrams for better understanding of problem and detail instructions for individual measuring. After completion of guide, these exercises were remeasured and exemplary protocol was developed. The first task is processed with analyser PUMA 4300E. The main issue is to introduce the structure of E1 frame and measuring of pulse shape on E1 line to students. The second exercise is focused on analysis a structure of STS-1 frame, which is currently used in SONET networks. This practice is realized on TutorTIMS educational system. The last exercise is running on hardware version of this system, device TIMS 301. The goal is to introduce students the bit clock, regeneration of the bit clock and measuring quality of the bit clock. The last chapter is dedicated to device TIMS 301. The primary purpose of this chapter is to make the usage of the system more effective.
Using of the attack "Pass the hash attack" for the compromising of high privileged accounts.
Jakab, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The master thesis deals with the attack "‘pass the hash"’ on high privileged accounts. Within the theoretical part is discussed creating hashes and its use. Next is a descrip- tion of the authentication in Windows operating system. There are also pointed out weaknesses in the design of authentication mechanisms. The last part deals with the individual attack and security options for mitigating the impacts. In the practical part are tested available tools for retrieving hashes from the files of the operating systems and tools which allow the attack itself. The output of this section is selection of the appropriate tools to demonstrate the attack in a proposed real environ- ment. The last topic is about designing the experimental environment, demostration of the attack with the possibility of getting through the network. The last steps deal with mitigating the impact of the attack.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
System for anonymous transmit of messages
Kislinger, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Diploma thesis deals with an anonymous transmit of messages using protocol for anonymous authentication. In first part, we introduce theoretical familiarization to the issues and description protocol for anonymous authentication. Further, it describes the suggestion of the communication between the client and the server. Finally, contains a description of the created system for anonymous transmit of messages, which consists of the server and clients, who can leave challenges on the server for other users and they obtains challenges from the server. The thesis explains how to start and control program. There are also discussed methods of computing verification values, encryption keys and messages and authentication of receivers.
The analysis of modern cloud solutions
Kis, Matej ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This thesis describes existing cloud storage systems. Description of the prerequisites of developing cloud and distributed systems are presented. Current storage systems such as Dropbox, iCloud and Google drive are described. Description is mainly focused on the resources of both protocols and derive a conclusion for the use in the cloud storage systems. The practical part of this work is focused on creating two labs, what will be implemented in the teaching syllabus of Projecting, Administration and Security of Computer Networks subject. The first of the labs is focused on the implementation of own cloud services. In the last lab students attention will concentrate on interception of communication secured with SSL protocol.
NFC technology and its security
Mertlík, Tomáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The first objective of this paper is to describe the Android operating system. The chapter presents history and architecture regarding to all versions of the operating system. The significant part of chapter is focused on security. The second main topic of this paper is analysing the NFC (Near Field Communication) technology. This technology is based on an older contactless system RFID (Radio Frequency Communication), so RFID is described either. The NFC technology chapter contains the description of usability, history and the definitions of physical layer, link layer and NDEF (NFC Data Exchange) data format, used for data transmitting. The next chapter is focusing on the analysis of the NFC vulnerability. It contains a possible attacks methods and solutions how to prevent them. The output of this paper is the projection and creation of an application, which allow sending an arbitrary data between two devices using the NFC technology. Additional Bluetooth technology can be used for larger files. In this case, NFC helps to create Bluetooth communication channel which is utilized for data transfer.
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.

National Repository of Grey Literature : 32 records found   beginprevious21 - 30next  jump to record:
See also: similar author names
4 Rosenberg, Michal
4 Rosenberg, Milan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.