National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Forensic Analysis of Anonymization Principles of Cryptocurrency Networks
Hromada, Denis ; Zavřel, Jan (referee) ; Veselý, Vladimír (advisor)
Při diskusích o kryptoměnách je častým tématem anonymita. Tato práce se věnuje stavebním blokům kryptoměny Bitcoin a jak na ni navazují kryptoměny jako Ethereum a Dash. Dále popisuje, jak a kde se v minulosti i přítomnosti v kryptoměnových sítích ztrácí soukromí a anonymita. Prvně se zaměřuje na anonymitu, respektive její nedostatky v samotném distribuovaném bloko-řetězu. Práce popisuje efekt znovu-využívání adres a shlukovací heuristiku založenou na společných vstupech transakce. Analyzuje je a popisuje nedokonalé aktuální řešení. Dále se práce zaměřuje na anonymitu mimo bloko-řetěz. Tedy na podpůrné služby, které jsou nedílnou součástí funkce kryptoměnových sítí jako jsou kryptoměnové peněženky. Práce diskutuje úschovu klíčů, různé druhy peněženek a jak komunikují s kryptoměnovými sítěmi. Následuje návrh modelu útočníka, jež je schopen odposlouchávat komunikaci uživatele kryptoměnové peněženky. Avšak nedokáže ji měnit. Jsou popsány vlastnosti, schopnosti a očekávaná úskalí takového útočníka. Poté práce věnuje pozornost třem kryptoměnovým peněženkám: Trezor Suite, Ledger Live a Electrum Wallet. Na těchto peněženkách demonstruje výše zmiňované vlastnosti kryptoměnových peněženek v praxi. Na základě všech těchto informací je navržena a implementována aplikace, jež je schopna napomoci uživateli určit, zda zachycený síťový provoz obsahuje komunikaci generovanou kryptoměnovou peněženkou. Nakonec je implementovaná aplikace podrobena testům. Výstupem těchto testů je, že za pomoci implementované aplikace je možné určit, jaká kryptoměnová peněženka byla použita. A to za předpokladu, že zachycený provoz obsahuje komunikaci, jež peněženky generují při jejich prvotním zapnutí. Následuje vyhodnocení práce a její další možné rozšíření.
Fiber optic infrastructure security
Děcký, Martin ; Dejdar, Petr (referee) ; Münster, Petr (advisor)
This bachelor thesis addresses the problem of security risks of optical fiber infrastructures from the perspective of modification detection. In the first part, the properties of optical fiber, information transmission in optical networks and individual elements of optical infrastructures are theoretically described. The next part is devoted to methods of measuring optical paths and attacks in them. In the last part, the risks of these attacks are analyzed and selected methods for modification detection are validated.
Detection of attacks on the L2 layer
Štefánik, Jaromír ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
Bachelor thesis is focused on cybernetic attacks on the second layer of the reference model OSI, namely: DHCP starvation, MAC flooding, Eavesdropping. The first, theoretical, part of the bachelor thesis is focused on the OSI model, types of cybernetic attacks and methods used by cybercriminals (attackers). In the practical part of the bachelor thesis an experimental workplace was set up (local network), the cybernetic attacks were realized, detection algorithms for given attacks were theoretically designed and programs designed to detect the given attacks were created.
Analysis and Demonstration of Selected Network Attacks
Jirásek, Jakub ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of this Bachelor thesis is to describe and realize selected network attacks which are taught at the FIT, Brno University of Technology. The thesis includes demonstration exercises that can be used for teaching computer network security. First part of this work discusses theory for each attack and possible security solutions. In the second part the practical realizations (for each network attack) are described.
Security of the RFID Technology
Bořutík, Stanislav ; Bartoš, Václav (referee) ; Bartoš, Pavel (advisor)
This paper is about security of the RFID systems, attacks on them and countermeasures. Attack to obtain secret key from Mifare Classic card was implemented. Options for eavesdropping RFID communication, security of the NFC technology and biometric passports are descibed too.
Leakage of information through active and passive elements in optical fibre infrastructures
Spurný, Vladimír ; Horváth, Tomáš (referee) ; Münster, Petr (advisor)
This bachelor thesis deals with the problem of information leakage from optical fiber infrastructures, both from the fibers themselves and from passive and active elements. The first part is devoted to a theoretical description of the transmission of information over an optical fiber and the function of individual components. The next part is focused on the theoretical analysis of possible information leaks. In the last - practical part, there will be an examination of some of the previously described possibilities of information leakage with subsequent analysis and a proposal for risk minimization.
Resilient fiber optic infrastructure
Spurný, Vladimír ; Kubánková, Anna (referee) ; Münster, Petr (advisor)
Optical networks are often mistaken for being secure, but there are ways to eavesdrop on the signal in an optical fiber without the user noticing. Cryptography is used to protect data, but quantum computing may threaten current encryption methods in the future. Misuse of active and passive elements affect the security of the optical infrastructure. The monitoring ports of active devices and the physical properties of optical fibre s pose risks for data leakage and eavesdropping. This work focuses on information transmission in optical fibers, data leakage risk analysis, and testbed design for measuring data signal interference. And then verifies the functionality of the workstation on a high-speed coherent transmission system.
Leakage of information through active and passive elements in optical fibre infrastructures
Spurný, Vladimír ; Horváth, Tomáš (referee) ; Münster, Petr (advisor)
This bachelor thesis deals with the problem of information leakage from optical fiber infrastructures, both from the fibers themselves and from passive and active elements. The first part is devoted to a theoretical description of the transmission of information over an optical fiber and the function of individual components. The next part is focused on the theoretical analysis of possible information leaks. In the last - practical part, there will be an examination of some of the previously described possibilities of information leakage with subsequent analysis and a proposal for risk minimization.
Detection of attacks on the L2 layer
Štefánik, Jaromír ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
Bachelor thesis is focused on cybernetic attacks on the second layer of the reference model OSI, namely: DHCP starvation, MAC flooding, Eavesdropping. The first, theoretical, part of the bachelor thesis is focused on the OSI model, types of cybernetic attacks and methods used by cybercriminals (attackers). In the practical part of the bachelor thesis an experimental workplace was set up (local network), the cybernetic attacks were realized, detection algorithms for given attacks were theoretically designed and programs designed to detect the given attacks were created.
The special methods of proof in criminal procedural law and comparison with anglo-saxon legal system
Skokanová, Regina ; Jelínek, Jiří (advisor) ; Vokoun, Rudolf (referee)
The goal of this thesis is to compare the special methods of proof in the criminal procedural law in the Anglo-Saxon coutries (England, Irend and Scotland). Firstly I will concentrate briefly on the history of criminal law in the Czech Republic, followed by a short introduction of the phases of the trial. Then, the special methods of proof in the Czech system of law will be focused on in detail (recognition, reconstruction, confrontation, on-site examination and the crime experiment). Then I will turn back to the methods of gathering special evidence in the Anglo-Saxon countries. When possible, I will point out the diferrence between both system in the chapters themselves as they arise, however in the I will conclude the findings in the final chapter if the thesis: how the methods differ and what they have in common. Powered by TCPDF (www.tcpdf.org)

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.