National Repository of Grey Literature 219 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Design of Smart Home Control System
Valičková, Monika ; Petr,, Komárek (referee) ; Ondrák, Viktor (advisor)
This Bachelor Thesis focuses on the selection and design of a Smart Home Control System for a planned superstructure of an apartment building in Brno. It's based on an analysis of the Architectural design of one of the apartments and investors requirements. The thesis gives an overview of suitable systems, which are currently available on the market and compares them. It also describes functions of the selected system and its parts, which are necessary for the implementation. Both technical documentation and cost analysis are also part of the thesis.
Security of wireless computer networks
Jelínek, Martin ; Pelka, Tomáš (referee) ; Doležel, Radek (advisor)
The master's thesis deals with the issue of Wireless Local Area Network (WLAN) from the viewpoint of the security and functional principle of security mechanisms. The transition to the issue concerning the security is accompanied by the methods of wireless data transmission operating on the level of physical layer (FHSS, DSSS, OFDM, MIMO), which is followed by the summary of individual 802.11 standards. The next part deals with the issue of shared transmission medium (CSMA/CA), influence of interference and correcting mechanisms (RTS/CTS). Within the security, the principles of the authentication along with the commonly used methods of security (WEP, WPA, WPA2) are described in detail. The first part concerning security deals with the security in the form of the WEP protocol, which is considered insufficient nowadays and points out the imperfect implementation and the consequent risks. The following part describes the security in the form of WPA which eliminates the implementation weaknesses of the previous WEP security protocol. The description of commonly used mechanisms of authentication (PSK, 802.1x), required temporary key management (PTK, GTK), data integrity (MIC) and encryption which uses TKIP protocol are also included. The last part, possible WLAN security, is aimed at the full support of 802.11i standard, which is called WPA2 (sometimes RSN). That part describes the basic encryption security element CCMP, which is based on the AES block cipher modes. The practical part of the thesis deals with the security verification of current wireless networks. In the process of verification the accessible HW means and programming tools of Open Source Software (OSS) are used. By means of verification it has been pointed out that there are possible security risks resulting from the security method which has been used. Also several recommendations how to reduce the security risks of the used method to minimum are mentioned.
Wireless Fidelity Networks
Řezníček, Milan ; Taft, Karel (referee) ; Koch, Miloš (advisor)
In this bachelor´s thesis I deal with the problems of wi-fi networks, concretely their security. The results of surveying are mentioned in the practical part of my work, in which I wanted to find out if at least 50% of wi-fi networks in several cities of Břeclav region are secured by WEP or WPA. Proposals how to improve wireless network security by some types of networks are mentioned in conclusion of my thesis.
Home Automation Based on Arduino/WeMos/RPi Platform
Ježek, Jan ; Špaňhel, Jakub (referee) ; Kapinus, Michal (advisor)
This work aims to propose and implement a home automation system based on individual devices' connection using conditions and actions. For example, when a magnetic barrier determines that a door was opened, a command that turns on lights in the hallway is sent. However, if a card reader does not register allowed card, the alarm will be triggered. This problem is solved by a server running on Raspberry Pi, which is periodically checking all conditions that a user has defined via a web page. Based on their fulfillment, it executes predefined action. Created solution provides a way how to connect smart devices in household easily and how to automate them. Users must program each module, complex conditions, and actions by themselves. This work presents an infrastructure for communication and examples on how to create such modules.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.
Implementation and Security of IPv6 Protocol in the Company
Hensl, Jaroslav ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This Master's thesis is focused on the IPv6 protocol implementation in a business environment. The thesis theoretically describes parts of the protocol which are then used in a real environment with respect to maximal compatibility and security. The thesis deals with hardware components, router configuration on FreeBSD OS, and switch configuration with RouterOS. The thesis also proposes how to monitor the network.
Modern trends in Wi-Fi IEEE 802.11 networks security
Lieskovan, Tomáš ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This work treats the matters of wireless networks, Wi-Fi. The paper describes the various principles of coding, such as WEP, WPA and WPA2. At first the WEP security method is analyzed with the view of the fact that it doesn´t meet contemporary safety requirements, further its successor WPA, namely TKIP and AES authentication methods, and last but not least WPA2 which nowadays serve as a safety standard. The work assesses the safety risks of individual security methods and makes several recommendations to achieve maximum security for wireless networks. In the work a commercially available hardware and for free dissemination available software (Open Source) are used.
Communication interfaces in mobile phones
Parduba, Jiří ; Holešinský, Pavel (referee) ; Morský, Ondřej (advisor)
The Bachelor thesis is focused on technologies, which are used for connection of mobile phone to other networks, which are available for current mobile phones - Bluetooth, IrDA Data, NFC, Cable connection and GPS, mobile networks, there are described technologies, which are used for connection to networks on the level of mobile operator - GSM, GPRS, EDGE and UMTS. In Bachelor thesis is also described connection of mobile phone and SIM card, there are shown functions of SIM card and how is the card used. These chapters are focused on security and programming properties of technologies. The appropriate technology, which was used in practiced part of Bachelor thesis, was chosen on basis of its properties with compare to other technologies. The most useful technology, which was chosen, is Bluetooth. There are also described three the most used operating systems for mobile phones – Windows Mobile (Phone), Symbian OS and Android, in this chapter is shown how these systems can be used. In practiced part of bachelor thesis are used data from theoretical part and by programming language JAVA is programmed the application, which communicates by Bluetooth. This application is programmed on the platform JavaME and users can use this application for example information announcements about historical monuments. This is concretely demonstrated on the historical monument in Brno.
Personal data protection in the Company
Anca, Marek ; Koch, Miloš (referee) ; Ondrák, Viktor (advisor)
This bachelor thesis deals with the safety of personal data in the company. The analytical part analyzes the current state of personal data protection of selected company. The theoretical parts describes the basic concepts and legal protection of personal data. The practical part proposes a possible system of solutions that would secure the personal data better.
Wireless Fidelity Networks
Bradáč, Dušan ; Slezák, Vít (referee) ; Koch, Miloš (advisor)
This document generally concerns of wireless networks. This job suggest building-up access point (surching for the place, economic part and technical part). Consequently suggest solutions clients stations (type of facilities, way of installations, financial and technical parts). Lastly it focus on servis in sence of repairs and renovation both access point and clients part.

National Repository of Grey Literature : 219 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.