National Repository of Grey Literature 21 records found  previous11 - 20next  jump to record: Search took 0.00 seconds. 
OTP implementation in a selected information system
Jajtner, Petr ; Havránek, Martin (advisor)
At present, it is necessary to protect sensitive data against abuse, but also allow au-thorized persons to change these data. To increase the security of logging for authorized persons we often introduce a two-factors authentication, where the first step is verification of the user's identity and in a second step is required to insert a one-time password called OTP. This thesis deals with implementation of OTP and integration into the selected sys-tem. It also includes test and verification of the functionality of the selected solution.
Context-Dependent Scanner
Hatina, Peter ; Koutný, Jiří (referee) ; Čermák, Martin (advisor)
This paper is devoted to principles of a lexical analysis and to a means of context resolution of a lexeme type, depending on its source code position. The lexical analysis, process of a lexical analyzer creation and possible solution for context lexeme recognition, based on a multiple automata system, is described. Lexical analyzer functionality is extended to accept tokens in other languages code blocks.
Multigrammars and Parsing Based on Them
Fiala, Jiří ; Lukáš, Roman (referee) ; Meduna, Alexandr (advisor)
This document deals with introduction focused on pragmatically oriented research at branch of theoretical computer science and with presentation of designed methods for chosen application topics. At this study the theoretical subject is represented by kind of generative system - multisequential grammar and application topics are chosen according to possibilities supported by multisequential grammars. In order to follow results published by Thompson (see [9]), Lindenmayer (see [26]), Mandelbrot (see [8]) and also studies published by Morneau (see [17]), which shows the relation between natural laws and human discipline - mathematics, we study the applications of multi-sequential grammars from two points of view: generative L-systems (which further includes applications of fractal geometry and biomathematics) and natural language processing (which further includes the design of proper abstract language). Some problems related to compiler construction are also mentioned.
Compiler of State Diagram Language to CHILL Language
Goldmannová, Zuzana ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
This thesis deals with the grammar of an existing proprietary state diagram language, which is used to simulate state diagrams employed in telephone exchanges. The goal of this work is to analyze the grammar and existing compiler of this language to CHILL language and also to design and implement a new compiler. This new compiler will be easier to manage and will eliminate errors and imperfections of the current arrangement. Finally this compiler is tested using existing files, that were formerly created for the current compiler, and also using files I created for testing purposes.
Design and implementation of authentication method for accessing web service in PHP language
Pokorný, Jiří ; Kacálek, Jan (referee) ; Uchytil, Stanislav (advisor)
Bachelor's thesis describes the available principles of authentication for access to Web services. It compares necessary hardware, safety, financial costs, complexity of implementation and difficulty of maintenance and service. The second part deals with the design and implementation of a particular authentication method for access to Web applications in PHP using the MySQL relational database. There is selected the authentication method by SMS code with regards to mentioned characteristics of particular methods. It is also supplemented by the possibility of using a client certificate.
Network attacks by Cain & Abel
Smékal, Lukáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
Security elements of electronic banking
Blaha, Ondřej ; Albrecht, Jakub (advisor) ; Voříšek, Jiří (referee)
The aim of my bachelorel thesis is to give a comprehensive overview of the electronic banking area and its security, with main focus on safety features used for authentication. The theses describes the available forms of electronic banking and the principles and elements of authentication methods. The main contribution of this work is the analysis of the environment of electronic banking ČSOB Bank and evaluation of authentication methods that the bank offers its clients. The result is an assessment of the current security status and suggestions what should ČSOB bank focus on in this area.
Password management in the enterprise network
Turanský, Jan ; Pavlíček, Luboš (advisor) ; Klíma, Tomáš (referee)
The aim of this bachelor work is to describe and evaluate the importance and options of password management in the enterprise. Almost each enterprise owns important documents with valuable information, which are saved to it' s servers or hard drives. Safe password management protects these information against attackers, who try to gain them and misuse. In a practical part is described actual password management in a specific enterprise with evaluation and with recommendation to improvement if necessary.
Online Banking and Consumers
KAKAŠ, Martin
The main aim of this thesis was to evaluate the use of Internet banking accounts among consumers. Investigate the pros and cons. Based on the analysis and data collection through online polling to assess and propose possible measures to improve services in internet banking. After studying the solved problems from expert resources, I set the main goals of this work and define hypotheses práce.K secondary data, I concluded the studies referred to literary resources and professional studies. Primary data were obtained šetřením.Výzkumné own experimental investigation of the main research was conducted via online interviews via the Internet and personal inquiries at the branch bank CSOB. The main research I conducted follow-up questions, interviewees were asked only at the branch of CSOB Czech Budejovice. A summary of results, I worked in tables and graphs and to evaluate the current situation in the field. Based on the data I provided any general recommendations for banks and concrete recommendations for a branch of CSOB Lannova 3 / 11 in the Czech Budejovice. Important recommendations for the Czech branch of CSOB Budejovice was economically evaluated against implementation. I completed my work, and finally appreciation. In which I have summarized the data obtained and the problems of internet banking, which I showed attachments.
Comparsion of classic and modern authentication methods
Koudela, Radek ; Doucek, Petr (advisor) ; Cidlina, Jaroslav (referee)
Owing to the growing significance of data protection and informatics in general, the importance of information system security counts among the most actual topics at this time. The main goal of this work is to give a comprehensive overview of the issue of users' authentication, including current trends on this field. There are also described the principles and working methods of classic and modern authentication methods, and listed their pros and cons. The main benefit lies in the comparison of these methods as well as in the evaluation of their deployment. As a result of this are suggestions, which can managers take into account when deciding about the method of authentication, and a description of weak points that need an attention. One part of this work also includes a reliability and performance test of modern biometric device.

National Repository of Grey Literature : 21 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.