National Repository of Grey Literature 78 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Lab exercise of electronic burglar alarm system with communication over Ethernet network
Harth, Petr ; Pust, Radim (referee) ; Burda, Karel (advisor)
This bachelor thesis deals with electronic burglar alarm systems that communicate over Ethernet network. On this basis, the lab exercise is designed for an integrated security system Xtralis 3000 to ensure access control and camera surveillance. The concept of lab exercise is justified, and prepared documentation for it. Subsequently, a brief analysis of the Xtralis 3000 system security is also made. The first part describes the development of electronic burglar alarm systems. The history as well as current state of the art of electronic burglar alarm systems are outlined. Also camera surveillance systems and access systems, which are nowadays combined with electronic burglar alarm systems, are briefly mentioned. The thesis goes on by describing the current trend of integrating various security systems into one system that communicates over Ethernet network. In the second part of this thesis the integrated security system Xtralis 3000 is being analyzed. First of all its general characteristics are described and then it goes on by explaining the distribution of the three subsystems, namely the access system S3000, the camera surveillance system V3000 and management software M3000. Subsequently, these systems are being described along with their features. After that, selected network protocols, which integrated security system Xtralis 3000 uses to communicate between its components, are being briefly discussed. In the third part a brief analysis of security integrated security system Xtralis 3000 is carried out. This system is divided into six parts in terms of threats of attacks. The fourth section it is devoted to the concept of lab exercise, which includes introductory balance sheet, the debate over the assigned elements, content and structure of the lab exercise. In the fifth part, is the thesis offers documentation to the lab exercise of integrated security system Xtralis 3000 communicating over Ethernet network, according to which students may perform this lab exercise. And finally, in the sixth part are the instructions for teachers, which describe how to introduce the lab exercise in teaching, with the associated problems and their solutions.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
Firewall security audit
Krajíček, Jiří ; Pelka, Tomáš (referee) ; Pust, Radim (advisor)
An aim of master´s thesis is Firewall security audit. Main tasks this work is introduce with principles of application for audit, create methodology and with this methodology make security audit of the selected firewalls. Theoretical part of this document deal with firewalls and possibilities of integration into network infrastructure. And next with audit and principles of application for security audit. Next practical part of this document deal with creation methodology and procedures including penetration testing. With this methodology is created audit of linux firewall and ISA 2006 included tips for change configuration providing more security.
Database system for printed circuit board production
Procházka, Jiří ; Pust, Radim (referee) ; Šebela, Radek (advisor)
Analysis of problems during designing web database and their structure for requirement of manufacturer of PCBs. Study of using applications intended for creation, administration and protection of database system. Systems for operation of web server. Principles of projection tabels in databases. Design of database's structure for production system of PCBs.
Infrastructure of public keys
Bědajánek, Ondřej ; Malý, Jan (referee) ; Pust, Radim (advisor)
The subject of my thesis dscribes function and principles of the public key infrastructure as well as certificate authority. Under the operation system Linux was created self signed certificate authority. Web interface was devoloped in PHP for the purpose of the generation, distribution and rejection certificates. Configuration files for OpenVPN are included in the thesis and wireless security is achived by OpenVPN.
Optimization of Wireless Networks against Attacks
Řezníček, Martin ; Pust, Radim (referee) ; Škorpil, Vladislav (advisor)
The work describes the design of wireless networks and the problems relating to this technology. In the theoretical part it deals with the learning network, the security technology and design wireless network. In the practical part it describes the simulation and measure of the signal strength. The ensuring of the safety by aid WPA as well as Radius authentication, TKIP data encryption, and the possibility of breaking into the network. The following chapters deal with the connection of the users to the network (domain) and with the application of VOIP telephony on the network. The last part describes the extension of the network and the associated problems.
Modern Token-based and Knowledge-based Authentication
Ševčík, Michal ; Pust, Radim (referee) ; Malina, Lukáš (advisor)
This bacherol thesis deals with a modern authentization using an object and knowledge. It mostly focuses on authentization by means of USB token, Smart Java Cards, Smart .NET Cards and NFC technology and their subsequent use in the authentization in a local network.
Hotspot system for more network operators
Strmiska, Roman ; Pust, Radim (referee) ; Burda, Karel (advisor)
Master’s thesis deals with the design and realization of a hotspot system for more Operators, it solves problems of QoS, billing of transferred data and distribution of services via a common wireless interface. The theoretic part is oriented to the selection of a suitable technology and explanation of a legislation, which relates to an activity of the hotspot‘s network. The practical part solves the choice of hardware, design and realization of the experimental network. In conclusion are tested transit parameters of the network and its functionality.
Proxy firewall
Kugler, Zdeněk ; Pelka, Tomáš (referee) ; Pust, Radim (advisor)
This diploma thesis deals with the topic of proxy servers and firewalls and considers other associated technologies and network techniques. It systematically describes the general issues of firewalls, with a special focus on proxy firewalls and their safety. Additional systems mentioned in this document are intrusion detection systems (IDS), antivirus systems and content control filters – as these are also connected with safety of networks, servers and workstations or with limiting various Internet sources. IDS systems can be typically supplemented with various additional applications or tools that enrich them and increase their potential – including graphic additions. This part is remembered too. Some systems can communicate with each other, which is successfully utilised (FW & IDS co-operation, for example). The purpose of the first large chapter is to present firewall technologies, to list firewall types, their basic functionality and to present the final comparison. It marginally mentions firewall applications in practice. Chapter two explains the theory of network address translation (NAT), deals with its functionality, safety and with limiting the NAT mechanism. Chapter three brings a comprehensive presentation of proxy servers. It explains their principle from the point of view of functionality and the specification of application areas. The chapter is complete with a clear list of proxy server types and their descriptions. The last chapter named Linux Proxy Firewall is the key part of the work. It deals generally with the Linux platform, the Debian GNU/Linux distribution, principles of safety policy, network configuration, network server safety, Linux firewalls (Netfilter framework, Iptables tool) and with the Squid proxy server. The following subchapters respect the previous structure: they describe the theories of intrusion detection systems, antivirus checks and content filtering based on different methods. All this is presented similarly to the previous chapters. A proxy firewall solution built on the Linux operating system has been proposed in the practical part. The Debian GNU/Linux distribution has been chosen, being very suitable for server use due to its features. This environment is also used for additional safety software contained in the proxy firewall: antivirus protection, content filtering and an intrusion detection system. The priority is the most comprehensive computer network security, which requires detection abilities with the broadest possible coverage in the area of network safety. The purpose of this diploma thesis is not only to describe the principle of operation of proxy servers and to compare them with other types and other systems, but it also brings my own proposed free solution, which increases network safety and has the ambition of comparing it with clearly commercial products available on the market.
Possibilities of Error Controls in Frequency hopping Stations
Pust, Radim ; Kovář, Pavel (referee) ; Wieser,, Vladimír (referee) ; Burda, Karel (advisor)
The doctoral thesis deals with design of coding for frequency hopping stations in band with intensive jamming. In digital modulations erroneous determination of the modulation state occurs due to jam at the receiver side. The result is erroneously transferred symbols of the message. Errors created during the transmission can be eliminated by using error control systems. It is also possible to prevent these errors by using algorithms (techniques) of frequency hopping which select the appropriate channel. Appropriate communication channel is a channel with a lower probability of erroneous symbol in the message. The main contribution of this thesis is to design a new frequency hopping technique with collision avoidance (FH/CA). The station with FH/CA technique measures signal levels in the considered several channels before every jump. Based on the measurements the most appropriate channel with the lowest value of measured signal level is selected. Therefore, it is more probable that a jump to an unoccupied channel with a transmission will occur. Using a mathematical model, the performance of the newly proposed FH/CA technique is compared with the currently used techniques FH and AFH. Comparison criteria are the probability of a collision between an FH/CA communication system and a static (device transmitting continuously at a fixed frequency) or dynamic jammer (i.e. other FH or AFH systems). By comparing the values of the probability of jammed transmission, indisputable theoretical advantages of the new FH/CA technique were found, compared to the currently used FH and AFH techniques. The FH/CA technique always has better or equal results compared with the FH technique in the case of interference by static and dynamic jammers. The FH/CA technique in a band with static and dynamic jammers usually has better results than the AFH technique. A significant contribution of the FH/CA technique can be seen in the case of dynamic jammers. On the other hand, in the case of static jammers the FH/CA technique is in certain situations worse than the AFH technique. The accuracy of the mathematical models were successfully verified on a simulation model that was created as a part of this thesis in the MATLAB environment. Based on the obtained data from the model there was designed coding for frequency hopping stations with the new technique of frequency hopping FH/CA which is designed for small-volume data transfer in a band with intensive jamming.

National Repository of Grey Literature : 78 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.