National Repository of Grey Literature 58 records found  beginprevious21 - 30nextend  jump to record: Search took 0.02 seconds. 
Modern network security trends of 802.11 standard
Ševčík, Lukáš ; Burda, Karel (referee) ; Endrle, Pavel (advisor)
Táto bakalárska práca sa zaoberá zabezpečením standardu 802.11. V úvode práce je detailne popísaný tento štandard a jeho jednotlivé zložky. V ďalšej časti sú popísané možnosti jeho zabezpečenia a prípadné nedostatky v nich. V práci sú uvedené praktické ukážky vybraných útokov. A na konci zhodnotenie momentálneho stavu a možnosti ako sa vyhnúť slabinám v týchto zabezpečeniach.
Wireless Network Security of Internet Service Provider
Parolek, Pavel ; Horák, Lukáš (referee) ; Ondrák, Viktor (advisor)
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
Safety risks of current routers
Bubelíny, Peter ; Vymazal, Michal (referee) ; Vychodil, Petr (advisor)
The thesis aims to study and document the problem router security. It present the characteristic information about a router, functions, types and locations in a computer network. Because router is integrated part of network, next are described the most commonly types of attacks and generally available security technologies. The thesis also offers insight into the router as a safety device in the role of the throat network, part of the deeper security infrastructure or access point in wireless networks. Next are described the selected security technologies against some of already mentioned attacks and also are offered opportunities to improve safety router. The next are demonstrated DoS and brute-force attacks on router in ethernet network and attacks based on sniffing packets on router in wireless network. Finally, the results are presented.
Wireless Network
Ďuraj, Peter ; Klusák, Aleš (referee) ; Koch, Miloš (advisor)
The subject of my bachelor thesis is the issues of wireless networks. It analyzes current standards and architectures used in wireless networking and its security. Next part focuses on present situation. The practical part contains projecting a wireless network specialized in high security.
Wireless Network
Bárta, Tomáš ; Knoth, Marek (referee) ; Koch, Miloš (advisor)
This thesis describes the design model of the wireless network at Rašínovo College Ltd. After studying theoretical knowledge concerning the issues in the implementation of wireless networks, which is dealt with in the theoretical part, the practical part is devoted to its practical requirements of the customer, the current state of the infrastructure and the subsequent draft model of wireless networks in the new school premises. When processing the project that is central to this work, it was necessary to take into account many aspects such as the implementation environment, it was necessary to select the appropriate network security with regard to the purpose of the network and the sensitivity of the transmitted data. In the final part, appropriate hardware was selected and economic analysis of the project was developed.
Wireless Networks in Corporate Environment
Svitana, Tomáš ; Hrušková, Sylvia (referee) ; Koch, Miloš (advisor)
Purpose of my bachelor’s thesis is wireless networks. The general introduction focused on basic terminology, most used protocols, standards, and topology and also network security is followed by specific draft and implementation of wireless technology into corporate environment. Company provides free accessible hotel Wi-Fi network on main departments and also for internal use requires high level secured wireless transfer of data.
Preventing attacks 802.11
Štefanec, Filip ; Kenyeres, Martin (referee) ; Novotný, Bohumil (advisor)
The main focus of this bachelor's thesis is on issues with security in wireless networks, based on standard 802.11. It includes description of most used encryption process and authentication methods in 802.11 networks. Also it explains functionality of EAP and RADIUS protocols, which are the main part of WPA/WPA2-Enterprise security mode. At the end of the thesis there is simulation of basic attacks on standard 802.11 and consequently desing and implementation of security, which prevents similar attacks. Implementation of security is based on authentication of clients through RADIUS server.
Extension of the Monitoring Probe with Wi-Fi Support
Findra, Michal ; Tisovčík, Peter (referee) ; Orsák, Michal (advisor)
The purpose of this work is to study Wi-Fi networks and their security and to create an extension for network probe, which is able to catch and analyze Wi-Fi traffic developed by The Accelerated Network Technologies (ANT) research group on FIT BUT. Study of software flexprobe components are described with proposal of wireless extension. Wi-Fi standards are described with their flaws and tools to crack Wi-Fi security with ability to intercept traffic on specific network. Implementation of wireless extension with testing is described in the last part of this thesis.
Specific Anomaly Detection Method In Wireless Communication Networks
Holasová, Eva ; Kuchař, Karel
This paper is focused on security problems in wireless networks covering on problems of security protocols like weak cipher in WEP (Wired Equivalent Privacy), dictionary attack in WPA (Wi-Fi Protected Access) and KRACK (Key Reinstallation attack) in WPA2. The structure of KRACK attack is described. Potential solution of KRACK is handling the network traffic especially with EAPOL (Extensible Authentication Protocol over LAN) frames is described, too. As a result security consists of multiple parts and it is important to both keep and update security level on every part of the network.
Automated Attacks on WiFi Networks with Low Detectability and Defense Against Them
Klusáček, Jan ; Vrána, Roman (referee) ; Orsák, Michal (advisor)
The goal of this bachelor's thesis is to create a tool which can be used for automated Wi-Fi attacks. All types of Wi-Fi security are described, with attacks, which can be used on specific security type. Existing tools used for hacking are described further, of which several are included to the final tool.

National Repository of Grey Literature : 58 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.