National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
Software for assisted study of access control protocols
Kopuletý, Michal ; Burda, Karel (referee) ; Vlček, Lukáš (advisor)
This bachelor’s thesis allows the reader to penetrate into the issues of access control protocols in area such as computer network, banking and access contactless cards. Each chapter provides example of frequently used authentication methods and lists of the pros and cons. Partially describes the methods of authoritzation. The main outcome of this bachelor’s thesis is an educational software executable in a web browser. For the reader’s better understanding there are, animation in the software. In order to verify student knowledge, there are test in teaching material. The thesis proposal provides authentication protocol that can be implemented into ACP protocol. The proposed authentication protocol can transmit information to a wide number of authentication methods (hash, symmetric cryptography, asymmetric cryptography)
Porovnanie AAA protokolov pomocou Petriho sietí
Baloga, Ľubomír
The diploma thesis deals with AAA protocols. The first practical part of thesis was deployment of protocols independently on virtualized computer networks and test their functionality. Next practical part of thesis is about models created with colored Petri nets. The aim of the thesis was to test the individual protocols using Petri nets as well as on the created computer networks. The result of this work is a summary of the possibilities of using protocols in practice because these protocols are rela-tively outdated but often used today.
Software for assisted study of access control protocols
Kopuletý, Michal ; Burda, Karel (referee) ; Vlček, Lukáš (advisor)
This bachelor’s thesis allows the reader to penetrate into the issues of access control protocols in area such as computer network, banking and access contactless cards. Each chapter provides example of frequently used authentication methods and lists of the pros and cons. Partially describes the methods of authoritzation. The main outcome of this bachelor’s thesis is an educational software executable in a web browser. For the reader’s better understanding there are, animation in the software. In order to verify student knowledge, there are test in teaching material. The thesis proposal provides authentication protocol that can be implemented into ACP protocol. The proposed authentication protocol can transmit information to a wide number of authentication methods (hash, symmetric cryptography, asymmetric cryptography)
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.