National Repository of Grey Literature 24 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Network Attack Generator
Buček, Hynek ; Košař, Vlastimil (referee) ; Bartoš, Václav (advisor)
This thesis is focused on the study of the best-known network attacks, especially on those that can be theoretically detected without knowledge of the contents of transmitted messages. The goal is to use the basis of acquired knowledge to create a tool that will simulate the behavior of the communication in different network attacks. Simulation outputs will be used for testing the quality of security tools designed to defend against network attacks. The simulator will be used only for offline testing, it will not be possible to carry out real attacks. Purpose of this work is to improve the security against network attacks nowadays.
Honeypot/Honeynet as modern services for classical information networks
Karger, David ; Blažek, Petr (referee) ; Fujdiak, Radek (advisor)
This work describes honeypots, their definition, clasification and logging possibilities. In the practical part honeypots are tested for the services that are most often attacked, their installation is performed and tests are made for basic familiarization with the functionality of the honeypot. Furthermore, the honeypot is exposed to the Internet and the obtained data are analyzed.
System for testing the robustness of communication unit LAN of remote data acquisition
Mlýnek, Petr ; Zeman, Václav (referee) ; Mišurec, Jiří (advisor)
Remote data collection systems are widely used. One of the area is also data collection in energetics, where the energy consumption can be collected daily and presented to users on-line. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the electrometers. The data transmission over the Internet can be subject of various attacks, which is the disadvantage. The understanding of attack method is the most important thing. The protection against the hackers is not complicated, but requires lot of attention. This master's thesis is focused on testing security of the communication unit LAN of remote data acquisition against attacks from the Internet. The next aim of this thesis is to describe algorithm of particular attack, needed recourses for their realization and method of their measurement and evaluation. Communication unit and component composition for attacks simulation is described in the first part of this thesis. The next part is focused on scanning for hosts and ports. The main part of this thesis is focused on the denial of service attacks and man in the middle attacks. In the end of my thesis is described selection of cryptographic system for remote data acquisition and is showed possibility of authentication mirroring. Problems of physical security are described too. The result of this thesis is script implementing all attacks, which are described.
Laboratory task demonstrates Intrusion Protection System
Bronda, Samuel ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis is divided into two parts. The theoretical part describes security systems, various types of attacks and details of systems to protect computer networks. The practical part focuses on the workplace, where will operate IDS / IPS system Snort and Suricata, the necessary adjustments and simulation of attacks. The bachelor thesis also includes putting the system into real terms.
Wireless Network
Bárta, Tomáš ; Knoth, Marek (referee) ; Koch, Miloš (advisor)
This thesis describes the design model of the wireless network at Rašínovo College Ltd. After studying theoretical knowledge concerning the issues in the implementation of wireless networks, which is dealt with in the theoretical part, the practical part is devoted to its practical requirements of the customer, the current state of the infrastructure and the subsequent draft model of wireless networks in the new school premises. When processing the project that is central to this work, it was necessary to take into account many aspects such as the implementation environment, it was necessary to select the appropriate network security with regard to the purpose of the network and the sensitivity of the transmitted data. In the final part, appropriate hardware was selected and economic analysis of the project was developed.
Honey-Pot: System for Attack Detection
Michlovský, Zbyněk ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This thesis deals with the area of honeypots and honeynets. It defines their classification and contains detailed descriptions of their properties and features. It further elaborates on several freely available systems. The main focus is given to honeypot Nepethes that was being run for one month on an unfiltered Internet connection. A detailed analysis of the collected data is then given.
The effect of the self-defense course on the women psyche
Studený, Pavel ; Stich, Jaroslav (advisor) ; Holá, Veronika (referee)
Title: The effect of the self-defense course on the women psyche Objectives: The main aim of this thesis is to find out whether taking a self-defence course has an impact on women's psyche. Especially on the part of psychology called self-efficacy. Methods: The quantitative data collection was in form of an online questionnaire in the survio application, which was based on the previously published "GSE" questionnaire, in which responses were rated on a four-point scale. Data analysis (evaluation of the responses) was performed on the basis of a graphical display. Results: The results of the questionnaire show that taking a self-defence course has a positive impact on women's psyche. According to the scores on the "GSE" scale, it is also evident that about half of the women experienced an increase in general self-efficacy. On average, the self-efficacy of these women increased by 7.125 points. Keywords: attacker, victim, women, perception of danger, estimate accuracy
Apache module for the DoS attack mitigation
Ruman, Róbert ; Sikora, Marek (referee) ; Jurek, Michael (advisor)
Táto práca sa venuje mitigácii viacerých typov útokov DoS. Naším cieľom bolo vytvoriť vlastný modul apache, ktorý dokáže zmierniť útoky typu flood, ako aj logické útoky. Modul bol vytvorený v jazyku C pomocou programu VS Code. Po vytvorení modulu sme vykonali viacero testov na získanie údajov, aby sme mohli náš modul porovnať s už existujúcimi modulmi apache. Porovnaním výsledkov testov sme dospeli k záveru, že náš modul dokáže zmierniť oba typy útokov. Výsledky testov sú vizualizované pomocou grafov v prílohe.
The personality of Czechoslovak ice hockey player Radek Ťoupal
REZEK, Michal
The diploma thesis deals with the processing of biography of the South Bohemian ice-hockey representative Radek Ťoupal. The main aim of this thesis is to chart his personality, his activity in Czech and foreign teams as well as in the national team and his achievements. The thesis itself is divided into four main parts. The first chapter contents the history of ice hockey in the world. The second one briefly describes the development of ice hockey in the Czech Republic. The third part is devoted to the history of ice hockey in České Budějovice. The last and the most important chapter is focused on Ťoupal´s life and main milestones of his sports career as an ice-hockey player. The thesis includes a number of original excerpts from historical periodicals. Furthermore the text is supplemented by a number of pictures, photographs and it also derives from a guided interview with the mentioned player.
Implementation of offensive standard situations in football at various performance levels
Král, Jan ; Pokorný, Ladislav (advisor) ; Krejča, Filip (referee)
The diploma thesis focuses on the implementation of offensive standard situations in football. Specifically in the competitions: division group B, third league group A and the highest competition, ie the first league. The analysis of the work is based on watching football matches from the record. The diploma thesis consists of two main sections, namely the theoretical and research section. The theoretical section is focused on theoretical concepts such as game systems, game combinations, game activities and standard situations. The research section contains the following research situations: how teams most often play offensive standard situations, from which place most offensive standard situations take place, which player most often plays offensive standard situations, from which area players most often end offensive standard situations, which player most often ends offensive standard situations, ending offensive standard situations on goal or out of goal in selected Czech football competitions, which I mentioned above. The information from the diploma thesis can be a support for coaches in the analysis of offensive standard situations of individual teams, and coaches will then be able to appropriately choose tactics in defending offensive standard situations. Keywords football, standard...

National Repository of Grey Literature : 24 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.