National Repository of Grey Literature 73 records found  beginprevious21 - 30nextend  jump to record: Search took 0.00 seconds. 
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Electronic signature in practice
Miška, Matěj ; Burda, Karel (referee) ; Člupek, Vlastimil (advisor)
This bachelor's thesis deals with the creation and development of a system for management and security of digital certificates used for signing documents. The application created in this thesis is conceptualised as a console application used from command line of a system. This solution is justified by the possibility of being continued as a graphic user interface extension or adopted by another application. The application allows for the creation of a user account, through which a person can import their certificates with passwords into the application and subsequently use the certificates in signing PDF documents or PNG files. Algorithms ensuring the security of saved data are implemented by the application. The theoretical part of this thesis analyzes the creation and work with certificates and signature keys in real life, including the creation of own self-signed certificate. The theoretical part concludes with the testing of usage of the certificates.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Technological and legal limits of electronic signature in relation to the identification of the signatory
Klimková, Natálie ; Harašta, Jakub (referee) ; Loutocký, Pavel (advisor)
The bachelor thesis is devoted to the issue of digital signatures, in particular advanced digital signatures, in the context of the EIDAS regulation. The first part discusses the legal aspect, defines the legal limits of signatures and analyses the decision-making practice in the Czech Republic. The second part deals with signatures, again mainly advanced, and their limits from a technical point of view. Finally, an application creating and subsequently using an advanced digital signature is presented.
Cyber security of endpoint elements
Fabík, Václav ; Procházka, Rudolf (referee) ; Smékal, Zdeněk (advisor)
This paper describes the design of cyber security for endpoints working on the ARM hardware architecture with the Linux operating system and using the TCP/IP and UDP/IP protocols for network communication. In the introduction, the reader is introduced to the basic concepts of cyber security as well as to the public key infrastructure (PKI) and ways of establishing a secure connection. The reader is introduced to the basic security techniques and the standard regulating security for industrial automation systems. In the practical part, the threat assessment of the presented network infrastructure is elaborated, and security functions that are embedded in NXP i.MX 7 processors and can be used for the cryptographic security of these devices are described.
Experimental infrastructure for electronic geocaching
Škrhák, Pavel ; Komosný, Dan (referee) ; Burda, Karel (advisor)
The aim of this work is to study conventional and electronic geocaching, and to implement the proposed infrastructure for electronic geocaching. The work describes convetional geocaching, it's history and present, as well as what is cache and what cache contains. next, the infrastructure for electronic geocaching, it's parts and communication between them is described. The work then describes the design of individual parts of the new infrastructure, and suitable technologies are selected for their implementation. The Django framework and PostgreSQL database were chosen for server appliaction.And a design for individual models for the server applicaation was made. The Angular framework was chosen for the client application. Design of individual pages and their functions was made for the client application. After the design, testing of already made applications was carried out, and it was decided, if the appliaction will be taken over or not. In the next part fo the work, the implementation of individual appliactions is made. The creation of page components and their functions, as well as communication with the server appliaction, is described for the client application. The server application implementation includes the creation of the designed models and database, as well as model serializers and API (Application Programming Interface) endpoints, that will allow the the client and mobile application to communicate with the server application. Individual activities and fragments were created for the mobile application, and communication with the server application and smart card was implemented.The smart card application has been taken over and slightly modified. The thesis further describes the testing of individual application and the results of this testing.
The position and activities of an authorized inspector under the Building Act
Fisenková, Tereza ; Staša, Josef (advisor) ; Svoboda, Petr (referee)
Presented thesis deals with approved inspector as a major entity of simplified procedure. It is focused on the origin of his function, internal organization and impact of his functioning. Author brings comprehensive view of current problems, primarily from point of view of judicature, specialized literature and comparison with foreign legislation. Author considers a possibility of amendment of the act besides an analysis of current legislation. Grammatical or teleological interpretation of the provisions governing the simplified procedure doesn't bring a satisfactory answer to the question of whether the legislation intended for governing bodies applies on the activity of authorized inspector. Whether through negligence or intent the legislature concerning authorized inspector is conceptual hybrid. In an attempt to clarify its functioning and to define it either a subject of public or private law, concept of simplified procedure deforms to disadvantage of different group of subjects and loses partly its original meaning. The only way out of this confusing situation is amendment of Building Act in favor of unambiquous concept of simplified procedure. The author deals with position of the authorized inspector in initial chapters. The procedure of nomination and assumptions that an applicant must meet...
A tool for validating electronic signatures on PDF documents
Selement, Pavel ; Peterka, Jiří (advisor) ; Kruliš, Martin (referee)
The subject of this graduation thesis is to study internal electronic signatures in PDF documents. The thesis introduces general principles of electronic signatures, deals with the internal structure of PDF documents including the connection of electronic signatures and describes the process of verifying an electronic signature. An integral part of this thesis is an implementation of an application, which performs verification of electronic signatures in a PDF document. The aim of this application is to verify the digital signature embedded in a PDF document according to the current legislation of the Czech Republic, while allowing users to change extensively the rules for evaluating the validity of the signature. Powered by TCPDF (www.tcpdf.org)
Trusted proxy in SSL/TLS connection
Smolík, Jiří ; Forst, Libor (advisor) ; Lukeš, Dan (referee)
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years and many implementations exist. However, all of them share a single technical solution which is based solely on the PKI authentication mechanism and suffers from multiple serious disadvantages. Most importantly, it is not compatible with several aspects or future trends of SSL/TLS and PKI, there's almost no space for improvement and its real use may spawn legal issues. After we analyze technical background and the current solution, we will propose another one, based not only on PKI but SSL/TLS too. Both solutions will be compared and general superiority of the new one will be shown. Basic implementation and analysis will follow, along with deployment requirements and ideas for future development. Powered by TCPDF (www.tcpdf.org)
Creating a Secure Company in the Selected Industry
Kyselka, Petr ; Tesař, Rostislav (referee) ; Jurová, Marie (advisor)
This diploma thesis deals with the investigation of possible dangers threatening human health+ that may arise during activities in the construction company P&P Stavební společnost and the health and safety management system in the company. The introductory chapter introduces the construction company and its focus. The next chapter presents the theoretical background and concepts occurring in the thesis. In the following chapter, the risks of a specific company order were identified and quantified using the FMEA method, and the completed "Check-list" required to obtain the Safe Company certificate is given. Lastly, there are proposed solutions to reduce the identified risks and to successfully obtain the Safe Company certificate.

National Repository of Grey Literature : 73 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.