National Repository of Grey Literature 134 records found  beginprevious124 - 133next  jump to record: Search took 0.01 seconds. 
Voice-over-IP principle and security problems
Bořuta, Petr ; Hošek, Jiří (referee) ; Vyoral, Josef (advisor)
This master’s thesis deals with security properties of protocols used for VoIP systems. In the first part, there is a description of most commonly used protocols and structure of VoIP systems. This part also discuss signaling and transport protocols. The second part of this paper describes techniques of ensuring quality of services. The next part presents SIP messages and communication. Last part of this paper overviews security risks of VoIP protocol. Practical part of this thesis describes creation of a testing VoIP network, on which several attacks has been made, fallowed by securing of mentioned VoIP network. Result of this thesis is evaluation of security risks connected to VoIP communication.
Design of the laboratory task for attack on fingerprint authentication
Spurný, Jiří ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
This thesis deal with personal fingerprint authentication and contains basic types of fingerprint readers included their principles of working. In this thesis are collected published attempts to this type of biometric authentication and in detail described way, how these attempts were realized . Realization of lab measurement is mentioned in practical part of thesis, is designed based on collected and evaluated information. Tendency for realization was to use materials and procedures which are available on market as well as computer technology. So no special equipment is needed for realization. Practical part describes in detail procedures for papillary lines capturing and their electronic processing. Described is also way to break through optical finger print sensor. For confirmation of procedure was made 12 artificial finger casts from Lukopren material. There casts were used to attempt on optical sensor Microsoft Fingerprint Reader with 100% success. Based on realized tests to produce artificial casts was proposed procedure for realization of laboratory measurement. This procedure is described in main part of this thesis. Proposed procedure has been confirmed in 90 minutes time limit, based on requirement to achieve time limit of school training session.
Advanced methods of filtering network traffic in the Linux system
Peša, David ; Komosný, Dan (referee) ; Kacálek, Jan (advisor)
This master's thesis is meant to provide techniques in designing and building a standalone packet filtering firewall in Linux machines, mainly for small sites who don’t give much service to Internet users. It deals with attenuating the effect of the most common types of attacks using iptables. It guides how to design, implement, run, and maintain Firewall. Techniques for continuously monitoring attacks is attempted. It also give a historical, architectural and technical overview of firewalls and security attacks.
Violence begets more violence or a justifiable defense in familypartnership
HÁLA, Miloš
This thesis is focused on the topic of justifiable defence and domestic violence. There is a comprehensive overview about justifiable defence in the first section. It is one of the circumstances to exclude illegality which is defined in § 29 in the Criminal Code. There are specified conditions when attack is treated as justifiable defence. If the statutory conditions are exceeded it is the excess. The second part of this thesis is dedicated to serious problem domestic violence. There are forms and features of domestic violence defined. Also consequences of domestic violence are mentioned. The third section describes the legal option to help victims of domestic violence. We create manual with some advices and recommendations. We trust that it will be a benefit for victims. There is a list with contacts to organizations which help to affected persons. Practical part of our thesis is case study. We deal with a concrete example of domestic violence in detail. At the end of this case is death of thug and imprisonment of bully women.
Analyse of security risk in a holding company
Kaiser, Petr ; Mészáros, Jan (advisor) ; Buchalcevová, Alena (referee)
The main goal of the bachelor essay is to analyze security of information technology in holding company. Partial goal is to describe common risk of information technology in company and suggest appropriate solution. The essay is dedicated on information technology or security of data in current world. Every company, especially holding company, with many branch offices must have the data security on first place. The goal was reached by author's knowledge about company and consultation with other administrators in conjunction with theory about security in information technology. That theory was get on internet and in books dealing with those issues. Most of information is from many sources, because the essay must be as much independent as possible and verified of course. You can see in the essay that information world accelerates and the requirements for IT security are very important. The first part of the bachelor essay focus on theory about security of information technology. You can find information about history, types and attack details there. Of course there is information about types of security solution. In next part there is analyzed IT security of company. In last part are solutions of security threads that were found in the analysis. The analysis is revealed that company is trying to implement security solutions, but many of them are ignored.
Security of Electronic payment system
Pilecký, Jakub ; Mészáros, Jan (advisor) ; Buchalcevová, Alena (referee)
This bachelor thesis discusses the security of electronic payment systems. It analyzes the security of individual system components and provides examples of attacks on that particular site. Included are also a security system requirements and safety principles to be followed. First, the readers are familiar with the issue, then the electronic payment systems are characterized, systematically divided according to certain criteria and then thesis states specific systems, which you are able use on the Internet. Then the work focuses on the security system at different locations identified as potentially at risk of attack options. Included are the technologies used, without which the systems were not able to guarantee security. Individual technologies are always related to the specific use of the system and explains the operating principle. Listed are the possible security breach system, which are explained. At the end of the work are considered methods for securing the system versus the user's behavior. A conclusion of work is based on this short thought.
The success of shooting in the Czech Extraleague Handball in season 2010/2011.
MĚCHURA, Matěj
This thesis analyses the successful of shooting in the highest Czech handball competition - Extraleague Men, in season 2010/2011. The analysis was realized by watching video recordings which were taken during the basic part of the competition. Besides the monitoring of the total success of these teams, we focused on components of the attack on the overall success and, for example, on shooting from the perspective of post player or shooting methods. The data were processed into graphs and commented.
Justifiable offenence
SEDLÁŘ, Tomáš
Práce vytváří ucelený pohled na problematiku a současné pojetí nutné obrany v České republice, jakožto jedné z okolností vylučující protiprávnost, která je vymezena v § 13 zákona č. 140/1961 sb., trestního zákona. Smyslem práce je vytvoření praktické pomůcky občanům naší země, aby věděli jakým způsobem jednat a jak se chovat v situacích, kdy bude bezprostředně ohrožen jejich život, zdraví nebo majetek popř. i další práva a svobody deklarovaná státem, v souvislosti s bezprostředním protiprávním a úmyslným jednáním jiné osoby či osob. V práci budou postupně uvedeny jednotlivé podmínky, které musí splňovat útok (bezprostředně hrozící nebo trvající) i obranné jednání, aby toto následně mohlo být příslušnými orgány posuzováno v mezích nutné obrany. Budou popsána určitá úskalí, která s sebou obranné jednání může přinést a bude zde uvedeno několik zajímavých soudních rozhodnutí, aby bylo patrné, jakým způsobem k této problematice přistupují soudci soudů jednotlivých stupňů. Rovněž zde budou zmíněny některé psychické faktory, které mohou ovlivnit jednání obránce v souvislosti se vzniklou zátěžovou situací, zejména spojená s intenzitou použité síly, popřípadě volbou obranného prostředku použitého k odvrácení útoku. Práce bude rovněž obsahovat pohled na nutnou obranu v souvislosti s instalací automatických zabezpečovacích a zejména obranných zařízení, jejichž používání a instalace není v současné době zákonem nijak upravována. V neposlední řadě bude práce obsahovat pohled do zahraničních úprav nutné obrany. V praktické části budou metodou dotazníku zjišťovány vědomosti a názory občanů na jednání v nutné obraně.
The structure of the implementation of the offensive forms of games FIFA World Cup on the top level
PULEC, Martin
This thesis focuses on the form and use the attack on the FIFA World Cup gualification systems the top level. We selected national team in order to monitor on a Summit tournament - ME 2008 in Austria and Switzerland. We have on the effectiveness of and the use of each type of attack systems.

National Repository of Grey Literature : 134 records found   beginprevious124 - 133next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.