National Repository of Grey Literature 31 records found  beginprevious22 - 31  jump to record: Search took 0.00 seconds. 
Intercept of the Modern Cryptographic Protocols
Halinár, Petr ; Košař, Vlastimil (referee) ; Kaštil, Jan (advisor)
This paper discusses the security-set used in communication networks. It contains a brief overview of the protocols and architecture description of public keys. Deals in detail with a description of certificates, their backgrounds and SSL protocols. It also represents a number of security shortcomings of these protocols and application design for the interception of HTTPS. Also the results of experiments with this application are stated.
Implementation of Network Security Algorithms in Home Router
Procházka, Tomáš ; Novotňák, Jiří (referee) ; Košař, Vlastimil (advisor)
This bachelor thesis briefly describes minimalist linux distribution OpenWRT and its installation in Linksys WAG160Nv2 router. It describes a selected router and it discusses a measuring procedure of a throughput, wich was chosen as a criterion for an evaluating the performance of the router. Furthermore, it examined the performance of the router using the original system and running OpenWRT. Design and implementation of interception algorithms, whose main purpose is to capture network traffic on the router, are described in the subsequent parts. Results are presented in the final part.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Security of the RFID Technology
Bořutík, Stanislav ; Bartoš, Václav (referee) ; Bartoš, Pavel (advisor)
This paper is about security of the RFID systems, attacks on them and countermeasures. Attack to obtain secret key from Mifare Classic card was implemented. Options for eavesdropping RFID communication, security of the NFC technology and biometric passports are descibed too.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
Internet communication risks
Štěrba, Radek ; Jeřábek, Jan (referee) ; Polívka, Michal (advisor)
This work deals with problems of communications protocols and servers. Primarily protocols TCP/IP are described. Next four the most used IM protocols (account of log in, communications and security) are described. Protocols for voice communications and problems of software phone systems are described here. Also database systems especially LDAP are mentioned here. A practical working is a part of this work too – a putting server for voice communications and sending messages and database LDAP into service. The process for putting the servers into service, connecting competent clients, and last but not least communications with LDAP are described.
System for testing the robustness of communication unit LAN of remote data acquisition
Mlýnek, Petr ; Zeman, Václav (referee) ; Mišurec, Jiří (advisor)
Remote data collection systems are widely used. One of the area is also data collection in energetics, where the energy consumption can be collected daily and presented to users on-line. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the electrometers. The data transmission over the Internet can be subject of various attacks, which is the disadvantage. The understanding of attack method is the most important thing. The protection against the hackers is not complicated, but requires lot of attention. This master's thesis is focused on testing security of the communication unit LAN of remote data acquisition against attacks from the Internet. The next aim of this thesis is to describe algorithm of particular attack, needed recourses for their realization and method of their measurement and evaluation. Communication unit and component composition for attacks simulation is described in the first part of this thesis. The next part is focused on scanning for hosts and ports. The main part of this thesis is focused on the denial of service attacks and man in the middle attacks. In the end of my thesis is described selection of cryptographic system for remote data acquisition and is showed possibility of authentication mirroring. Problems of physical security are described too. The result of this thesis is script implementing all attacks, which are described.
The law applicable to the interception of communications of parliamentarians in selected European states (and the connection to the issue of parliamentary immunity): Study 1.227
Vlčková, Marie ; Havlenová, Jitka ; Syllová, Jindřiška
From the foregoing sources we may summarize that most of the analyzed countries allow wiretapping of MPs under the same conditions as other citizens (how the police intercepts so the intelligence ones). Only in limited number of countries the parliamentary immunity covers wiretapping. In that case there is necessary to obtain approval for wiretapping of an MP of some authority of Parliament. In a few countries, the interception of MPs has special regime. The permission must be approved by the specific body (court) other than the parliamentary chamber, however, different from the authority that permits the wiretapping of other citizens. Regarding the supervisory authority of wiretapping, most states have no such parliamentary body. Mostly post-socialist states have some parliamentary supervisory body dealing with wiretapping of secret services (committee).
Fulltext: Download fulltextPDF
Methods of protection against eavesdropping and snooping in digital networks
Pokorný, Tomáš ; Šalamon, Tomáš (advisor) ; Štorková, Veronika (referee)
The aim of this work is to provide a comprehensive overview of eavesdropping and snooping in digital networks, describe possible threats and show technological and organizational precautions against them. The first chapter introduces the reader into the topic and shows all the main threats. The second chapter describes technological precautions with the emphasis on data flow. The first part of this chapter explains the terminology. Next part tries to solve the security of each type of a communicational channel followed by the virtual private networks issues, physical networks and the risks of encryption. The third chapter analyses organizational issues with the emphasis on legislation. Precautions in this chapter make the technology from the previous chapter more effective. The fourth chapter uses the findings from previous chapters and tries to secure a company in all its complexity. This allows the estimation of total cost. The practical part of this thesis should serve for companies with already developed infrastructure who want a transparent solution that would protect them from eavesdropping and data thefts.

National Repository of Grey Literature : 31 records found   beginprevious22 - 31  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.