National Repository of Grey Literature 6 records found  Search took 0.03 seconds. 
Analysis and Demonstration of Selected Network Attacks
Jirásek, Jakub ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of this Bachelor thesis is to describe and realize selected network attacks which are taught at the FIT, Brno University of Technology. The thesis includes demonstration exercises that can be used for teaching computer network security. First part of this work discusses theory for each attack and possible security solutions. In the second part the practical realizations (for each network attack) are described.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Wi-Fi network security
Gec, Ivo ; Šimek, Pavel (advisor) ; Vasilenko, Alexandr (referee)
Bachelor thesis is thematically focused on the security of wireless networks operating on frequency bands of 2.4 GHz and 5 GHz. The theoretical part of bachelor thesis is devoted to problemacy of wireless technology. In teoretical part of bachelor thesis are contained various standards, modes of operations, possible attacks, mechanisms and security, which prevent probably attacks or threats. Practical part of bachelor thesis describes a possible design of security for this company, which deals with accounting and taxes.
Analysis and Demonstration of Selected Network Attacks
Jirásek, Jakub ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of this Bachelor thesis is to describe and realize selected network attacks which are taught at the FIT, Brno University of Technology. The thesis includes demonstration exercises that can be used for teaching computer network security. First part of this work discusses theory for each attack and possible security solutions. In the second part the practical realizations (for each network attack) are described.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Security of Electronic payment system
Pilecký, Jakub ; Mészáros, Jan (advisor) ; Buchalcevová, Alena (referee)
This bachelor thesis discusses the security of electronic payment systems. It analyzes the security of individual system components and provides examples of attacks on that particular site. Included are also a security system requirements and safety principles to be followed. First, the readers are familiar with the issue, then the electronic payment systems are characterized, systematically divided according to certain criteria and then thesis states specific systems, which you are able use on the Internet. Then the work focuses on the security system at different locations identified as potentially at risk of attack options. Included are the technologies used, without which the systems were not able to guarantee security. Individual technologies are always related to the specific use of the system and explains the operating principle. Listed are the possible security breach system, which are explained. At the end of the work are considered methods for securing the system versus the user's behavior. A conclusion of work is based on this short thought.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.