National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Multi-factor authentication using smart devices to access a cloud service
Huška, Luděk ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis addresses the issue of current multi-factor authentication methods for modern ICT systems. With increasing demands for security and digitalization, data protection is crucial. The thesis provides an overview of current technologies and solutions in the area of multi-factor authentication and explores their integration into a system for accessing the Nextcloud cloud service using an Android mobile application. The theoretical part deals with authorization, authentication, access control and cryptography basics. The practical part includes the development of an Android application and the implementation of the server part using the ECDSA protocol. The result is a functional login process and an app for Nextcloud that enhances data security and provides users with a more convenient and secure way to log in.
Cybersecurity game in OpenStack platform
Huška, Luděk ; Lieskovan, Tomáš (referee) ; Stodůlka, Tomáš (advisor)
The bachelor thesis is about creation of the cybernetic game on the OpenStack platform. The work starts with an explanation of necessary knowledge like: Informational cybernetic and computer security, security threats, and testing of the overall security. In the practical part, there is created a cyber game that focus on exploitation and basic security vulnerabilities. The next part involves analysis ongoing complexity of hardware resources like RAM, CPU, disc, etc. In the end, there is a guideline for a lab exercise, which is made for students and professors or teachers both separated.
Cybersecurity game in OpenStack platform
Huška, Luděk ; Lieskovan, Tomáš (referee) ; Stodůlka, Tomáš (advisor)
The bachelor thesis is about creation of the cybernetic game on the OpenStack platform. The work starts with an explanation of necessary knowledge like: Informational cybernetic and computer security, security threats, and testing of the overall security. In the practical part, there is created a cyber game that focus on exploitation and basic security vulnerabilities. The next part involves analysis ongoing complexity of hardware resources like RAM, CPU, disc, etc. In the end, there is a guideline for a lab exercise, which is made for students and professors or teachers both separated.

See also: similar author names
2 Huška, Lukáš
Interested in being notified about new results for this query?
Subscribe to the RSS feed.