National Repository of Grey Literature 219 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
Possibilities of securing inter-processor communication for dedicated devices
Rácek, Luboš ; Člupek, Vlastimil (referee) ; Troják, David (advisor)
Diploma thesis focuses on introduce problematic issue of inter-core communication, implementation of Linux distribution made by project Yocto on chosen platform of NXP i.MX microcontrolers family and solution for secured inter-core communication.
Presentation of Web API Data in Windows 8 Application
Kalus, Jiří ; Maršík, Lukáš (referee) ; Milička, Martin (advisor)
The aim of this bachelor's thesis is to design and implement a Windows 8 application that can provide data from web API. Transferred data are sensitive for the user with an emphasis for authorization and security. Data is displayed in real time. The thesis decribes possibilities for development of the application for WinRT architecture, communication of the application with web API, authorization and security of transffered and offline data. The application of dashboard type was created that display data from various financial categories. For the visualization basic graphic components were used, some of them includes animations.
Secure, reliable and adaptive network based on Cisco devices
Lefler, Přemysl ; Komosný, Dan (referee) ; Kubánková, Anna (advisor)
This bachelor thesis deals with design of secure, reliable and adaptive network using Cisco network devices. Thesis includes design of a network with description of each individual technology, that were used in the design to meet requirements for safety, reliability and adaptivity. The last chapter describes frequently occuring network attacks along with a description of their execution followed by implementation of defense against them.
Secure reading of smart meters
Chaloupková, Denisa ; Mlýnek, Petr (referee) ; Kohout, David (advisor)
The work deals with the implementation of the secure push mode of the DLMS standard. It introduces the DLMS/COSEM standard, contains a theory for message security and describes how push works and its attributes. The Gurux library in Java is used and the example gurux.dlms.push.listener is modified. The Raspberry Pi platform is used as the server. Wireshark and the Gurux DLMS Translator available in Gurux GXDLMSDirector were used to verify security of a push message. Subsequently, push messages are compared in terms of their size according to the type of security used. The larger the content of the data sent in the message, the smaller the additional data needed to secure the messages in proportion to the total volume.
Advanced methods of filtering network traffic in the Linux system
Peša, David ; Komosný, Dan (referee) ; Kacálek, Jan (advisor)
This master's thesis is meant to provide techniques in designing and building a standalone packet filtering firewall in Linux machines, mainly for small sites who don’t give much service to Internet users. It deals with attenuating the effect of the most common types of attacks using iptables. It guides how to design, implement, run, and maintain Firewall. Techniques for continuously monitoring attacks is attempted. It also give a historical, architectural and technical overview of firewalls and security attacks.
Design methods for computer networks
Božek, Martin ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
Bacherol‘s thesis deals with a topic of a suitable computer network design for a mid-sized infrastructure, its security and router and firewall realization. This boundary element is able to manage basic processes of network controlling between inner and outer network. There is a brief analysis of OSI model but we focused our attention on TCP/IP model more closely. Our project includes description and outlines an importance of the most common elements of the particular network type and their contribution to the security. Description of the three most frequent topologies of the infrastructure type follows. On the basis of the found information, we have chosen and analysed the most suitable topology from the security point of view. The result of the theoretical part is a network model proposal. In the practical part, some our findings are tested and implemented in a real setting. We used a technology of virtualization for the final realization and testing. Thanks to the virtualization used for realization and testing, we could configure the router and the firewall, which are boundary elements that separate the inner network from the Internet.
Configurable Security Email Proxy
Židek, Stanislav ; Samek, Jan (referee) ; Cvrček, Daniel (advisor)
This bachelor thesis deals with design and implementation of multiuser configurable system capable of securing communication via electronic mail. Emphasis is put especially on remote configuration. It also describes existing protocols used for this communication and some of the mechanisms that can secure this communication from different points of view.
Solution of Internal Threats in the Information Security Management System
Trčka, Martin ; Sopuch, Zbyněk (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with internal threats in the organization and their restriction with the assistance of DLP system. The first part of the thesis discusses the information security management system and describes requirements for the introduction of the ISO/IEC 27000 standards series. Next chapters detail internal threats and technical description of the DLP system. The second part of the thesis analyzes the organization and describes the process of implementation of DLP solution, which aims to reduce internal threats. The conclusion of the thesis describes acceptance agreement and financial evaluation of the implementation.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Wireless Network
Vincour, Jan ; Popelka, Dušan (referee) ; Koch, Miloš (advisor)
The focus of this Bachalor`s thesis is the design and realization of the wireless network in the company LINDEN s.r.o. The goal is to extend the current WiFi coverage to the entire company and fulfill the company`s requirements on the network availability and security.

National Repository of Grey Literature : 219 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.