National Repository of Grey Literature 6 records found  Search took 0.00 seconds. 
FITkit - PC Crypted Communication
Kouřil, Miroslav ; Strnadel, Josef (referee) ; Růžička, Richard (advisor)
This thesis deals with the issue of concealing confidential data being transmitted in between two systems. The coding standard AES as a block symmetric cipher has been selected. In practise, the connection between the FITkit platform and a PC was set via serial communication. The FITkit is programmed in language C and the PC in language C++ . There has been designed a simple protocol for setting up the connection and for the information exchange about encoding. Due to the difficulties with serial communication on the kit side there have been created two applications. The first application reads encoded kit data and translates them with the assistance of  preset values. The second one communicates with the kit emulator on the other computer and works at full range, what means - establishing the connection, generating keys modes  and number of encoding rounds, safe key exchange and the possibility of data reading and writing to the kit.
Secured access for web applications
Humpolík, Jan ; Pelka, Tomáš (referee) ; Doležel, Radek (advisor)
This thesis mainly concerns often neglected security part of each web application, but also secure access users themselves. Describes theoretically and practically modern security technology, on a web application being tested and shows a possible way of defense. Gives instructions for installing its own web server.
FITkit - PC Crypted Communication
Kouřil, Miroslav ; Strnadel, Josef (referee) ; Růžička, Richard (advisor)
This thesis deals with the issue of concealing confidential data being transmitted in between two systems. The coding standard AES as a block symmetric cipher has been selected. In practise, the connection between the FITkit platform and a PC was set via serial communication. The FITkit is programmed in language C and the PC in language C++ . There has been designed a simple protocol for setting up the connection and for the information exchange about encoding. Due to the difficulties with serial communication on the kit side there have been created two applications. The first application reads encoded kit data and translates them with the assistance of  preset values. The second one communicates with the kit emulator on the other computer and works at full range, what means - establishing the connection, generating keys modes  and number of encoding rounds, safe key exchange and the possibility of data reading and writing to the kit.
Tool for Activity and Project Planning
Chromec, Jiří ; Navrátil, Jan (referee) ; Zuzaňák, Jiří (advisor)
This bachelor's thesis creates application for scheduling and management projects plus events. Thesis describes suggestion plus implementation hereof solution. It includes background for understanding standard calendar format iCalendar and shows its practical usage. It's described design of databases of contacts and calendar events. Theses is evaluates advantages and disadvantages of used this databases.
Secured access for web applications
Humpolík, Jan ; Pelka, Tomáš (referee) ; Doležel, Radek (advisor)
This thesis mainly concerns often neglected security part of each web application, but also secure access users themselves. Describes theoretically and practically modern security technology, on a web application being tested and shows a possible way of defense. Gives instructions for installing its own web server.
State of internetbanking and its security in the Czech republic and the rest of the world
Havlín, Petr ; Matuštík, Ondřej (advisor) ; Exnarová, Anna (referee)
Práce se zabývá analýzou stavu služeb internetového bankovnictví v ČR a ve světě. Seznamuje čtenáře s bezpečnostními prvky, které jsou v tomto odvětví využívány a s rozsahem funkcí, které aplikace jednotlivých bank nabízejí. Jsou popsány hlavní způsoby, které jsou použity pro šifrování přenosu dat po nezabezpečené síti Internet. Obsaženy jsou jak metody založené na symetrických, tak asymetrických klíčích. Pozornost je věnována i některým typům útoků, které mohou být proti šifrám vedeny. Práce se také věnuje možnostem bezpečné identifikace uživatelů. Jsou popsána statická hesla, jednorázová hesla, klientské certifikáty a systémy založené na principu challenge-response. Analyzována je jejich vhodnost a odolnost proti praktikám typu ?Phishing?, ?Pharming?, ?Vishing? nebo útok typu ?Man in the middle?. Zmíněno je i dodatečné zabezpečení prováděných transakcí. ?Bezpečnostní politika jednotlivce? doporučuje pravidla, která by měl dodržovat každý zodpovědný klient. Naznačeny jsou i technologie, které by podstatně zvýšily ochranu před neoprávněným vniknutím do systému a které by také umožnily odhalení podvodných transakcí v reálném čase.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.