National Repository of Grey Literature 48 records found  beginprevious39 - 48  jump to record: Search took 0.01 seconds. 
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.
802.11 standard security techniques and their features
Endrle, Pavel ; Pust, Radim (referee) ; Pfeifer, Václav (advisor)
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
Security risks of wireless access networks
Špidla, Milan ; Hošek, Jiří (referee) ; Polívka, Michal (advisor)
Master´s thesis „Security risks of wireless access networks“ deals with wireless access networks, which are the most widespread in this time. The main target is realization of attacks wireless access networks protected by various using methods. This thesis shows main securities gaps, which originate from project this networks. These securities gaps are used for realization attacts in practical part. In the next part I took attention of network´s monitoring possibilities.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
Security prospects of wireless communication networks
Hráček, Jiří ; Lambertová, Petra (referee) ; Škorpil, Vladislav (advisor)
This master thesis deals with all types of wireless networks security – in personal, local, metropolitan and also mobile networks. This work is mostly focused on wireless local area networks (WLANs), which are the most widespread at nowadays. This work describes attacks to the wireless local area network, attackers steps and possible protection against it. Some of these attacks are tested in practical part of this work. In this master thesis there were also designed and created two laboratory exercises. One of them is a simulation in the wireless network using Opnet Modeler application. The other exercise is strictly practical type.
Support for education of biometric access systems
Navrátil, Petr ; Herencsár, Norbert (referee) ; Burda, Karel (advisor)
This thesis describes general function of biometric access systems and summarizes problems of their practical use. It also shows security risks of these systems. It defines basic terms, which are used in this area, describes kinds of errors and their representation. One part of this thesis deals with biometric method of fingerprints recognition. It explains fingerprints’ atomic basics, basic principles and processing of digital fingerprint image. Next part describes concrete biometric access system V-Station by Bioscrypt Inc. Besides basic description it focuses on technology of biometric sensor and algorithm, essential parts of biometric system. The thesis continues with security analysis of this concrete system. In this part I target on weak points of the system and I design possible attack on the system. In the last part of my thesis I designed laboratory exercise, which is supposed to be realized by student. It is composed it by several tasks to let students understand working with the system and attached software. At the same time, they have opportunity to think about system by themselves a make their own opinion about possibilities of the system. There are many pictures in this thesis to make term clear and to better understanding of problems of biometric security systems.
Watermarking of static images
Bambuch, Petr ; Burda, Karel (referee) ; Číka, Petr (advisor)
The thesis deals with the security of static images. The main aim is to embed the watermark into the original data so effectively, to avoid removal of the watermark with the use of simple and fast attacks methods. With developing of the watermarking techniques the technique of attacks are improved and developed also. The main aim of the attacks is to remove and devalue the hidden watermark in the image. The goal of the thesis is to check current techniques of static image watermarking and implement two methods of watermarking, which are to be tested for robustness against attacks.
Analysis of deal-of-the-day services market from the viewpoint of security
Maskaliunets, Stanislau ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
In this bachelor thesis I analyze the market of deal-of-the-day services from the viewpoint of security. First of all, I describe the security of the information systems as a term. I also explain the methods of securing web applications. Web applications run on HTTP protocol, and the more secure web applications use the HTTPS protocol, which contains the TLS/SSL. In this work I describe working principle of HTTP protocol. I also describe the SSL/TLS protocols and methods of their acquiring. In the theoretical part, I also describe the methods of cryptography. In the practical part, I describe the methods of defense against attacks and analyze the deal-of-the-day services. I describe the evolution of both the world and Czech deal-of-the-day services. At the end, I analyze deal-of-the-day websites security and compare the results of this analysis.
Left-wing terrorism in Italy - Red Brigades and New Red Brigades
REMEŠ, Štěpán
The topic of this Bachelor Thesis is the Italian left-wing terrorism focused on the group of the Red Brigades. The work is divided into three parts. The first part outlines political and economic situation in Postwar Italy. Author gets from the economic miracle to the origins of social unrest, which resulted in the formation of leftist organizations. Among them were also the Red Brigades. The following section gives an overview of the most famous actions of the Red Brigades and it also talks about the radicalization of methods used during the attacks. Author does not forget to mention strategies that were taken against this terrorist organization by Italian State, which succeeded in suppressing the Red Brigades. The third and final section focuses on the group of the New Red Brigades, which is considered the successor to the Red Brigades. .
Security of web pages
Totzauer, Tomáš ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor thesis deals with security of web sites and includes a practical part about security of cloud services. There are described techniques of web sites security at this paper. Web sites use for its operation the HTTP protocol and more secure web pages use the HTTPS protocol, which also includes a security layer called SSL or TLS. Since the web application can never be safer than the protocol that is used, all the protocols and layers are further discussed in this thesis. Especially their characteristics from the perspective of safety, principles of their functioning, their security weaknesses and recommendations in order to reduce risks and increase their safety are closer clarified. The theoretical part continues in disquisition of encryption, related to security layers. Then in the same context, it describes the major certification authorities. The next section analyzes the security of cloud computing. The reader learns about the security risks in connection with the use of the cloud, about standards and legislation. At the end of the theoretical part, trends in the security of cloud computing that we can expect in the coming years are discussed. In the practical part, there could be found attacks against web applications that use both HTTP and HTTPS. Each attack is described in terms of principle and defense techniques against it. This thesis also includes recommendations for proper use of safety layers SSL and TLS which are used on secure web applications. The largest and best known providers of cloud computing from the perspective of securing their services are compared. In this area of IT, there are no borders, so that the world's biggest players are also the biggest in the Czech Republic. Both corporate and private cloud services are explained. For each service, there is a technical description of its security and a preview of safety policy of the organization that operates this service.

National Repository of Grey Literature : 48 records found   beginprevious39 - 48  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.