National Repository of Grey Literature 53 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Installation, configuration and testing of server services DHCP, FTP, VPN, NAT and SNMP in IPv4 and IPv6 environments
Brázda, Libor ; Sysel, Petr (referee) ; Novotný, Vít (advisor)
This bachelor thesis focuses on selecting server services such as FTP, DHCP, VPN, NAT and SNMP and their implementation in operating system Windows Server 2008 R2 and linux distribution Debian. The theoretical part analyzes the problems of TCP/IP protocol including addressing in IPv4 and IPv6 environments. In next chapters, thesis contains detailed descriptions of individual services, their principles, security, etc. The last part is focused on the description of the laboratory task, their activities and contribution to student and also software used in the implementation tasks. The result of laboratory work is created job on the configuration of individual services in both operating systems. Tasks are made for students without previous knowledge of the problem, so they can successfully configure and test these tasks.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Security of real time multimedia data transmission
Otoupalík, Petr ; Koutný, Martin (referee) ; Hošek, Jiří (advisor)
This thesis deals with technology and security of real-time multimedia data transmission. The possibilities of the security of a multimedia data transfer and the mechanisms defined for the security of the signaling protocols SIP and H.323 are described with the view of security. The possible attacks on the real-time transfers are also mentioned. The basic requirements on the safe and reliable data transfer are specified. The main part of this thesis is focused on the security analysis of the data transmission of the selected communication clients, which use different security methods. The last part of the thesis deals with realization of simple attacks on multimedia data transmission and also on the SIP protocol.
Challenges in Optimal Bandwidth for Medical Image Transfer
Schindler, Vladimír ; Šimák, Boris (referee) ; Šárek, Milan (referee) ; Dostál, Otto (advisor)
This dissertation thesis is focused on the optimization of bandwidth parameters for the transport of medical image data between medical devices and remote data storage. As real and fully functional structure, which will be analyzed in this work. It was selected system MeDiMed (Metropolitan Digital Imaging System in Medicine). The thesis examines the operation of the small health organizations and their modalities, which use this system for remote data archiving. Traffic analysis is then statistically processed. The thesis also deals with the analysis of increasing the security during accessing health system, and assesses its impact on transmitted data. The effect of setting the transmission parameters and the most widely used types of ciphers on the transfer speed is also compared.
Project of Client-based VPN Remote Access Solution for the worldwide Retail Business Company in the region of Central Europe
Ondrák, Richard ; Havlín, Petr (referee) ; Kříž, Jiří (advisor)
The aim of this Thesis is to project and describe new Client-based Remote Access Solution for the Tesco Stores retail company in the region of Central Europe. Based on facts that the all present Tesco’s Remote Access Systems have not any longer met the increasing requirements and needs of corporate users and suppliers it is clear that the main scope is to find and implement such Solution that will meet and exceed all requirements. The main Project Aspects are to be the ease of use, security of the solution, unexacting administration of the system and user groups, and one unified Solution for the all Countries from the region of Central Europe that is suitably integrated in the Tesco IT infrastructure.
Module Extending Functionality of GDPR Solution
Janeček, Vít ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
The goal of this thesis is to introduced the principles of access control technologies, the General Data Protection Regulation and the software for data leakage protection. An essential part of the work is a draft and implementation of the expansion module for user device authentication including shared storage access authorization. Therefore, this module allows to verify whether a user can access shared corporate resources. It also allows to enable or disable access based on specified attributes, such as the type of the protected service or user permission. The basic verification of the module's functionality is realized through different sets of tests and a virtual environment that simulates the corporate environment. The result of the draft is a module that allows to verify access based on the device, and this module is moreover integrated into the Safetica security platform.
Protocol IPv6 and its implementation scenarios
Rýzner, Zdeněk ; Krajsa, Ondřej (referee) ; Lambertová, Petra (advisor)
This thesis deals with IPv6 – the Internet layer protocol and its situation in today’s Internet. In theoretical part are described major changes, which the new protocol brings to networking area – especially addressing, headers format and autoconfiguration. Comparison of IPv6 and IPv4 is also included. Practical part covers connecting to IPv6-Internet with selected transition methods, analyses these methods and features its implementation in dependence on network environment.
High-Speed Virtual Private Networks
Porubova, Anna ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Purpose of this project is to become familiar with the issue of virtual private networks (VPN). Describe VPN types and their benefits. Analyze and evaluate various VPN solutions. There will be suggested test scenarios and their configuration solutions.
Design of new laboratory exercises for GNS3 environment
Barniak, Martin ; Koton, Jaroslav (referee) ; Jeřábek, Jan (advisor)
Diploma thesis deals with four laboratory tasks in simulation environment GNS3. Designed tasks are primarily focused on comparison of IPv4 and IPv6 protocols. In the first task the subject is concerned about OSPFv2 and OSPFv3 routing protocols. Next themes are transit techniques like NAT-PT and tunneling like GRE and 6to4. The second task is focused on configuration of routing protocols like EIGRP and EIGRPv6. Next sections are concerned about DHCP and ICMP protocols within IPv4 and IPv6 protocol suits. The third task is primarily focused on security relations of protocol suite IPv6. It contains OSPFv3 authentication, access lists and Cisco stateful IOS firewall. Content of the fourth task is protocol MPLS. First part of this task is concerned about basic configuration of this protocol and second part is focused on MPLS within IPv6 environment. All tasks contain test questions and individual part task.
Cryptographic protocols used in computer networks
Lúdik, Michal ; Hajný, Jan (referee) ; Doležel, Radek (advisor)
This work deals with the analysis of basic cryptographic protocols, principle of the authentication and verification of their safety. In the first part of the work is a short introduction to the issue - cryptography, some types of attacks, authentication and authorisation. In the second part is the analysis of protocols SSH, SSL, IPSec, and Kerberos, authentication and verification of their functionality and security under laboratory conditions.

National Repository of Grey Literature : 53 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.