National Repository of Grey Literature 74 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Quantum and Post-quantum Cryptography
Krivulčík, Andrej ; Ricci, Sara (referee) ; Hajný, Jan (advisor)
S pokrokom v rozvoji kvantových počítačov prichádza hrozba prelomenia algoritmov ktoré sa používajú pri bežnej komunikácii. S týmto vzniklo odvetvie pre post-kvantovú kryptografiu ktoré vyvíja algoritmy odolné voči kvantovým počítačom. Cieľom tejto diplomovej práce naštudovanie metód pre kombináciu a využitie kľúčov ustanovených pomocou kvantových a post-kvantových algoritmov takým spôsobom, keby pri došlo k prelomeniu jedného z daných algoritmov tak výsledný hybridný klúč bude stále bezpečný. Výsledný klúč je následne využitý pri šifrovaní súboru pomocou AES--256 ktorý je zaslaný medzi klientami.
Automation of MitM Attack on WiFi Networks
Vondráček, Martin ; Lichtner, Ondrej (referee) ; Pluskal, Jan (advisor)
Tato bakalářská práce se zaměřuje na výzkum v oblasti bezpečnosti bezdrátových sítí. Práce přináší studii široce využívaných síťových technologií a principů zajištění bezpečnosti bezdrátových sítí. Analyzované technologie a způsoby zabezpečení trpí slabinami, které mohou být zneužity k provedení útoku MitM . Práce zahrnuje přehled dostupných nástrojů zaměřených na využití jednotlivých slabin. Výsledkem této práce je balíček wifimitm a CLI nástroj, oba implementované v jazyce Python. Balíček poskytuje funkcionalitu pro automatizovaný útok MitM a může být použit jako součást dalšího software. Nástroj wifimitmcli je schopen úspěšného provedení plně automatizovaného útoku bez jakéhokoli zásahu útočící osoby. Tento výzkum nachází využití v oblasti automatizovaných penetračních testů a forenzního vyšetřování.
Camera Recording Management System
Šulc, Ondřej ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
The aim of this bachelor thesis is to create a network security system focusing on compatibility with the widest possible group of IP cameras from various manufacturers and support for remote access to records even from places outside the local network. This problem is solved using two closely cooperating applications. The first application runs on a device in the local network (in our case miniPC Raspberry Pi). The application creates the records by receiving and storing RTSP transmissions from individual cameras. It then modifies these records into a form usable for display on websites and sends the second application from which the user can access them. This application is referred to in the text as agent or agent application. The second application has a web user interface and serves the end user as a tool to manage agents, IP cameras and captured records. By principle of the application, it is important for it to be accessible on a publicly available domain. This application is referred to in the text as web or web application. The use of this architecture does not violate any of the network communication standards, which include, in particular, the initialization of communication from the network behind the NAT service.
Management and Monitoring System for Computer Lab
Kudláček, Marek ; Zeman, Kryštof (referee) ; Mašek, Pavel (advisor)
This master's thesis deals with a system for PC mass management and monitoring. There is a brief description of Puppet, Chef and Ansible, which are tools enabling this functionality. The overall system issues are solved by Ansible. This thesis also includes a script created for a classroom’s remote management according to a beforehand fixed assignment. The system enables remote installation and configuration of applications, creation of users, editing the files, update of the system and many more. A web application was created for this system. Through this application, the system can be controlled via web browser, both from local and public network. Practical examples of the issue dealt with is also part of the thesis.
Web Information System and its Security Principles
Nehasil, Filip ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
The main topic of the thesis is problem of the security of the web application. Spheres that are likely to be vulnerable are thoroughly examined and ways of protecting the application in the area of access control, data transfer, user input, output and state keeping are suggested. Furthermore, with regard to the security, possible solutions of audit, backing up, web server security, database design and protection against spam robots are described. This project is also concerned with the analysis of requirements, detailed design and implementation of the club information system with demonstration of mentioned security solutions. The systems of members' evidence, evidence of breeding dogs and their pedigrees, publication of actions and results and the content management system of other sections of the web presentation are among others implemented within the scope of this IS. All the implementation solutions are based on HTML, CSS, JavaScript, PHP and MySQL technologies.
Facebook Social Network Datamining and Reconstruction of Captured Communication
Bruckner, Tomáš ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
This thesis deals with social network Facebook from perspective of computer forensic science with focus on obtaining sensitive information about tracked users. Its main goal is implementation of the tools for reconstruction of captured communication and Facebook data mining. Core of this application has been implemented in framework for processing of captured communication Netfox.Framework, which is being developed by Faculty of Information Technology, Brno University of Technology. Man-in-the-Middle attack has been used for capturing of decipherable communication. Selenium WebDriver has been used as a tool for data mining. Developed solution is able to reconstruct Facebook conversations between users, addition of new statuses and comments, and interception of sent files. Data mining module is able to obtain public information about tracked users, especially places they recently visited, past and upcoming events, public user details, albums and photos, friendlists and mutual friends with other users. As part of the bachelor thesis, data analysis, implementation of the application, validity testing and benchmark analysis have been performed.
Web applications for user authentication
Vybíral, Petr ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
Network applications in .NET Framework
Koch, Michal ; Morský, Ondřej (referee) ; Lattenberg, Ivo (advisor)
The thesis deals with the programming of network applications using .NET Framework. C# is a programming language. The thesis consists of four parts. The first part is devoted to web services, their characteristics, practical publications and web service client which is the the most common case of use of this service. The second part deals with client-client communication. As an example a simple messages sending is shown here on which are explained the principles how to create this type of application and what classes are available. The third part deals with the communication clientserver. An server application is created to connect multiple clients and send their requirements and server response them. The last part is devoted to encrypted communication. The model client-client is extended to asymmetric encryption. The thesis contains also tutorial videos which show a simple ASP.NET application development and its connection to the web service or ASP.NET application that supports HTTPS protocol and the necessary IIS configuration.
E-shop design and implementation of company
Horsák, David ; Svoboda, Zdeněk (referee) ; Dvořák, Jiří (advisor)
This diploma work characterizes and analyzes the business company. It contains method of solving problems, consequent on the analysis, solving implementation problems and it is project tools for improve future position of company on market by means of electronic market. For further, it is describe economics analysis of design e-shop and it is implementation in chosen company.
Secure Semantically-Based Discovery of Resources in RESTful Architecutre
Koudelka, Jiří ; Burget, Radek (referee) ; Rychlý, Marek (advisor)
This thesis looks into the problematics of secure semantically-based discovery of resources in REST-ful architecture.  The subject of this thesis is the implementation and potential extension of the mRDP for secure discovery of resources in REST-ful architecture, including the implementation of a corresponding open-source library compatible with the Android operating system.  Another topic of this thesis is the implementation of simple example applications using this library.

National Repository of Grey Literature : 74 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.