National Repository of Grey Literature 10 records found  Search took 0.03 seconds. 
Rating of Security Business Informations
Veselý, Martin ; Nohel, Oto (referee) ; Dvořák, Jiří (advisor)
The thesis ”Rating of security business information” is focused on creating metrics in order to assess security of an information system of the company Tech4sec, spol.s.r.o. Risks of the information system and their impact on economy of the company are elaborated by application of the created metrics. To build the part of IS/IT strategy of the company that leads to elimitation of the risks found is dealt with in the thesis as well.
Intelligent systems of mass data acquisition in power grids
Kretek, František ; Mlýnek, Petr (referee) ; Mišurec, Jiří (advisor)
his semestral thesis deals with problems of multiple data collection over power lines. It is included separation of the power lines. Principles and functions of transport technology PLC, GSM and GPRS. Requirements on security of transported data.
Remote Client Security
Friedberg, Jiří ; Karásek, Jan (referee) ; Malina, Lukáš (advisor)
This master’s thesis is devoted to safe operating remote station. The security of data and electronic services is very important nowadays because the number of attacks to computer networks is increasing. The security of network services and information can be provided in several different ways which can be combined. The basic security mechanisms are authentication and data encryption. Both these methods are included to the implementation of operating remote station which is the main part of this work. The user of the resulting application will have a choice from several methods of authentication and data encryption. Whole traffic is encryption from the transfer of view of remote desktop to the transfer of files. Safety factor depends only up to the user consequently on that what type of authentication and encryption the user choose. The thesis also deals with analysis of implemented safely functions. Brings the results of analysis of effect of encryption algorithms to data connection of remote desktop.
Intelligent systems of mass data acquisition in power grids
Kretek, František ; Hošek, Jiří (referee) ; Mišurec, Jiří (advisor)
his semestral thesis deals with problems of multiple data collection over power lines. It is included separation of the power lines. Principles and functions of transport technology PLC, GSM and GPRS. Requirements on security of transported data.
Using Cellular Automata for Data Encryption
Dvořák, Martin ; Trunda, Otakar (advisor) ; Mráz, František (referee)
Cellular automata are discrete systems with very simple rules but very diverse behaviour. Some cellular automata can generate high-quality pseudorandom bit sequences. This leads us to the question of whether cellular automata could be used in cryptography, as a replacement for stream ciphers for instance. We will create and compare various methods for generating long one-time-pads from short keys, where our methods will utilize cellular automata. Besides direct design of cryptographical algorithms, we will also create an evolutionary algorithm, which will try to connect our building blocks in the best possible way. The outcome of our work will be a Windows desktop application for file encryption. Powered by TCPDF (www.tcpdf.org)
Intelligent systems of mass data acquisition in power grids
Kretek, František ; Mlýnek, Petr (referee) ; Mišurec, Jiří (advisor)
his semestral thesis deals with problems of multiple data collection over power lines. It is included separation of the power lines. Principles and functions of transport technology PLC, GSM and GPRS. Requirements on security of transported data.
Using Cellular Automata for Data Encryption
Dvořák, Martin ; Trunda, Otakar (advisor) ; Mráz, František (referee)
Cellular automata are discrete systems with very simple rules but very diverse behaviour. Some cellular automata can generate high-quality pseudorandom bit sequences. This leads us to the question of whether cellular automata could be used in cryptography, as a replacement for stream ciphers for instance. We will create and compare various methods for generating long one-time-pads from short keys, where our methods will utilize cellular automata. Besides direct design of cryptographical algorithms, we will also create an evolutionary algorithm, which will try to connect our building blocks in the best possible way. The outcome of our work will be a Windows desktop application for file encryption. Powered by TCPDF (www.tcpdf.org)
Intelligent systems of mass data acquisition in power grids
Kretek, František ; Hošek, Jiří (referee) ; Mišurec, Jiří (advisor)
his semestral thesis deals with problems of multiple data collection over power lines. It is included separation of the power lines. Principles and functions of transport technology PLC, GSM and GPRS. Requirements on security of transported data.
Rating of Security Business Informations
Veselý, Martin ; Nohel, Oto (referee) ; Dvořák, Jiří (advisor)
The thesis ”Rating of security business information” is focused on creating metrics in order to assess security of an information system of the company Tech4sec, spol.s.r.o. Risks of the information system and their impact on economy of the company are elaborated by application of the created metrics. To build the part of IS/IT strategy of the company that leads to elimitation of the risks found is dealt with in the thesis as well.
Remote Client Security
Friedberg, Jiří ; Karásek, Jan (referee) ; Malina, Lukáš (advisor)
This master’s thesis is devoted to safe operating remote station. The security of data and electronic services is very important nowadays because the number of attacks to computer networks is increasing. The security of network services and information can be provided in several different ways which can be combined. The basic security mechanisms are authentication and data encryption. Both these methods are included to the implementation of operating remote station which is the main part of this work. The user of the resulting application will have a choice from several methods of authentication and data encryption. Whole traffic is encryption from the transfer of view of remote desktop to the transfer of files. Safety factor depends only up to the user consequently on that what type of authentication and encryption the user choose. The thesis also deals with analysis of implemented safely functions. Brings the results of analysis of effect of encryption algorithms to data connection of remote desktop.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.