Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.01 vteřin. 
MAC řízení přístupu
Grepl, Miroslav ; Soumar, Michal (oponent) ; Pelka, Tomáš (vedoucí práce)
Diplomová práce přehledně popisuje problematiku SELinuxu a způsoby vytváření vlastní bezpečnostní politiky se zaměřením na referenční politiku a její mechanizmy. Navrhuje metodiku vytváření konkrétních bezpečnostních pravidel doplněnou o praktické příklady jejich aplikace. Dále popisuje dostupné bezpečnostní pravidla pro zabezpečení http, ftp, ssh služeb, jejich případnou modifikaci a praktické využití. Podle navržené metodiky jsou tyto služby zabezpečeny vlastními pravidly a obě metody zabezpečení vzájemně porovnány a přehledně vyhodnoceny.
Enterprise Network Design and Simulation - Cisco Virtual Lab
Ollé, Karol ; Komosný, Dan (oponent) ; Soumar, Michal (vedoucí práce)
This Master's Thesis (further only MT) deals with subject of enterprise network design according to recommendations of Cisco company. As part of the thesis is developed simulation of enterprise network, according to created concept. The virtual lab is realized by open-source programs and monitored by Nagios software. The first part contains brief introduction to network designs and description of hierarchical network design. The second part describes building blocks of the network design and their role in hierarchical network. Each block is further divided into specific network devices and then there are described services that have to be provided by them. The third part of MT deals with basic service demands which are expected from today’s network infrastructures. The main focus is on availability of network services. There are specified information about second and third layer protocols of OSI model which are securing availability of all services provided by the network infrastructure in case of failure. The following fourth part contains information about WAN design. The fifth part describes security risks which can jeopardize network availability. It also contains description of attacks on network users. The sixth part of MT contains brief description of software tools for network management and monitoring (Nagios, Cisco Security Device Manager) and programs for simulating Cisco routes and switches (Dynamips & Dynagen, GNS3) and Cisco PIX firewall simulation program (PEMU). The seventh chapter deals with developed network design concept. The concept is deployed as virtual lab running under simulation programs. The virtual infrastructure allows demonstration of settings and behavior of all protocols and equipments described before. In conclusion is the most important recognition that the network concept and its simulation as virtual lab is functional and it can be used for tests or educational purposes.
Enterprise Network Design and Simulation - Cisco Virtual Lab
Ollé, Karol ; Komosný, Dan (oponent) ; Soumar, Michal (vedoucí práce)
This Master's Thesis (further only MT) deals with subject of enterprise network design according to recommendations of Cisco company. As part of the thesis is developed simulation of enterprise network, according to created concept. The virtual lab is realized by open-source programs and monitored by Nagios software. The first part contains brief introduction to network designs and description of hierarchical network design. The second part describes building blocks of the network design and their role in hierarchical network. Each block is further divided into specific network devices and then there are described services that have to be provided by them. The third part of MT deals with basic service demands which are expected from today’s network infrastructures. The main focus is on availability of network services. There are specified information about second and third layer protocols of OSI model which are securing availability of all services provided by the network infrastructure in case of failure. The following fourth part contains information about WAN design. The fifth part describes security risks which can jeopardize network availability. It also contains description of attacks on network users. The sixth part of MT contains brief description of software tools for network management and monitoring (Nagios, Cisco Security Device Manager) and programs for simulating Cisco routes and switches (Dynamips & Dynagen, GNS3) and Cisco PIX firewall simulation program (PEMU). The seventh chapter deals with developed network design concept. The concept is deployed as virtual lab running under simulation programs. The virtual infrastructure allows demonstration of settings and behavior of all protocols and equipments described before. In conclusion is the most important recognition that the network concept and its simulation as virtual lab is functional and it can be used for tests or educational purposes.
MAC řízení přístupu
Grepl, Miroslav ; Soumar, Michal (oponent) ; Pelka, Tomáš (vedoucí práce)
Diplomová práce přehledně popisuje problematiku SELinuxu a způsoby vytváření vlastní bezpečnostní politiky se zaměřením na referenční politiku a její mechanizmy. Navrhuje metodiku vytváření konkrétních bezpečnostních pravidel doplněnou o praktické příklady jejich aplikace. Dále popisuje dostupné bezpečnostní pravidla pro zabezpečení http, ftp, ssh služeb, jejich případnou modifikaci a praktické využití. Podle navržené metodiky jsou tyto služby zabezpečeny vlastními pravidly a obě metody zabezpečení vzájemně porovnány a přehledně vyhodnoceny.

Viz též: podobná jména autorů
2 Soumar, Martin
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.