National Repository of Grey Literature 54 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Ensuring availability and security in industrial networks
Zatloukal, Zdeněk ; Fujdiak, Radek (referee) ; Holasová, Eva (advisor)
Currently, a key aspect of industrial automation is ensuring a high level of security, reliability, and data availability in industrial communication networks. Given the rising cyber threats, it is essential to develop and implement advanced strategies for protecting industrial infrastructures. This thesis aims to perform a comprehensive analysis and development of security solutions for industrial networks, focusing on the Modbus RTU/TCP and MQTT communication protocols, which are crucial for the effective management of modern industrial operations. The work employs methodological approaches that combine theoretical research with practical experiments. It includes an analysis of existing protocols, the design of communication security through these protocols, and their subsequent testing in a controlled industrial environment to verify security, efficiency, and reliability. The analysis revealed significant deficiencies in the security of existing systems and led to the integration of new security measures into the industrial switchgear, which significantly improved the protection of data and communication infrastructure. The implemented solutions demonstrate significant progress in protecting industrial networks against various types of attacks. This thesis represents a significant contribution to the field of industrial network security. The results of the work provide valuable information for the further development of security technologies in the industry and offer practical guides for engineers and technicians who are working on improving the security status of industrial systems.
Intelligent Energy Measurements for Homeowners' Association Using 5G Networks
Horčička, Patrik ; Možný, Radek (referee) ; Mašek, Pavel (advisor)
Theoretical analysis of IoT communication technologies LPWAN. A more detailed analysis of 5G-IoT technologies in the licensed frequency band, such as NB-IoT and LTE Cat-M. List of supported application protocols for IoT devices (MQTT, CoAP, LwM2M, DLMS/COSEM) with more detailed information about DLMS/COSEM. Quectel UMTS \& LTE EVB kit with BG770A-GL module was used to create the first reference 5G-IoT device. Measuring of radio properties in two locations. Creation of TLS tunnel for communication between Virtual computer and RPI designed for DLMS/COSEM data.
Hardware cryptographic modules for LAN security
Loutocký, Tomáš ; Lambertová, Petra (referee) ; Zeman, Václav (advisor)
The thesis deal with the problems of virtual private network (VPN). The first part of the thesis is focused on the description of the basic terms of computer security which are useful for better understanding the other parts. There is a description of VPN technology and its separation of VPN by various aspects in the second part of the thesis. The next chapter is dedicated to the description of realization of VPN by using IPSec. There is shown how to secure laboratory network by using of the products of the Safenet Company in the practical part of the thesis. There are also stated the modular techniques how to use products in the network in practical part. Some of the modular techniques describe security weaknesses of the products which are possible to exploit in the laboratory network and they also describe the ways how to protect them against misusage.
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
Secure network based on CISCO systems
Wagner, Zdeněk ; Beran, Jan (referee) ; Macho, Tomáš (advisor)
This work deals with the matter of Virtual Private Network (VPN) utilizing both contemporary and older protocols and the possibilities of their use. Among the most interesting parts there are those presenting various ways of use of the VPN technology, IPSec protocol, IOS SSLVPN and RSA server with HW token ensuring the two-factor user authentication.
Geologic Well Data Processing, Transformation and Administration
Kováč, Jakub ; Boráň, Pavel (referee) ; Ondrák, Viktor (advisor)
The bachelor thesis is concerned with the geophysical data processing, transformation and administration of a small company for purpose of constant access to an actual informations. The thesis presents solutions with consider on security, reliability and economics of a whole problem.
Software support of teaching of cryptography protocols
Marek, Tomáš ; Lambertová, Petra (referee) ; Burda, Karel (advisor)
Document contains informations about authentication, encryption, data integrity and data authenticity. Next part includes description of well know cryptography protocols, their functions and also their weaknesses. All of these acquired informations were used in concept and final software support for teaching of cryptography protocols, which is able to run on clasic web-browser. Thats why the application was designed as web PHP pages using JavaScript and AJAX, which ensures plaform and OS architecture independency. Besides the descripted and ilustrated part of application there are also interactive parts and animations. The last period contains description of education software and its functions. Source code can be found on the appended CD.
Implementation and Security of IPv6 Protocol in the Company
Hensl, Jaroslav ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This Master's thesis is focused on the IPv6 protocol implementation in a business environment. The thesis theoretically describes parts of the protocol which are then used in a real environment with respect to maximal compatibility and security. The thesis deals with hardware components, router configuration on FreeBSD OS, and switch configuration with RouterOS. The thesis also proposes how to monitor the network.
Creating a VPN Access Point on Raspberry Pi
Kovařík, Martin ; Hájek, Jaroslav (referee) ; Benedikt, Jan (advisor)
This bachelor thesis deals with creating a virtual private network (VPN) access point on a single-board Raspberry Pi computer. The theoretical part describes the principle of VPN, the most common tunneling protocols and the Raspberry Pi computer in general with its various generations and models. Selected protocols are implemented on the Raspberry Pi and their hardware load, response and throughput are measured. The stability of the protocols is tested and reliability evaluated.
High-Speed Virtual Private Networks
Porubova, Anna ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Purpose of this thesis is to become familiar with the issue of virtual private networks (VPN). Describe VPN types and their benefits. Analyze and evaluate various VPN solutions. There will be suggested test scenarios and their configuration solutions.

National Repository of Grey Literature : 54 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.