National Repository of Grey Literature 14 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Advanced Password Testing
Škuta, Matúš ; Januš, Filip (referee) ; Malinka, Kamil (advisor)
Cieľom tejto diplomovej práce je získať poznatky v oblasti zabezpečenia hesiel a následne ich využiť pri tvorbe nástroja na kontrolu hesiel. Dôraz je kladený hlavne na analýzu hádania hesiel. V tejto práci sú analyzované rôzne metódy hádania hesiel a následne porovnávané s výsledkami získanými Parishom. Potom používame vygenerované heslá od hádačov hesiel na vytvorenie slabého súboru údajov, ktorý analyzujeme rôznymi metódami. Poznatky získané z analýzy sa použijú na vytvorenie reaktívnej a proaktívnej kontroly hesiel. V závere práce je otestovaná a vyhodnotená účinnosť vytvorených hádačov hesiel.
Rainbow Table Module for Password Cracking Systems
Kaprál, Lukáš ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
Má závěrečná práce je zaměřena na tvorbu modulu, který bude kompatibilní s již existujícími nástroji pro generování rainbow tables a lámání hesel. Rainbow tables jsou předzpracované vyhledávací tabulky používané v kryprografii pro efektivní prolomení hashovaných hesel tím, že je mapují zpět na jejich původní nešifrovaný text. Modul bude zároveň schopen efektivně uchovávat, generovat datové sady a vyhledávat v rainbow tables. Dále bude tento modul upraven tak, aby mohl fungovat se systémem Fitcrack. Nakonec bude vytvořeno rozhraní, pomocí kterého se bude komunikovat s tímto modulem. V této práci se dozvíte o rainbow tables, co to přesně je a jak fungují, popíši již existující nástroje a software, uvidíte a porozumíte návrhu celého modulu. Poté si můžeme přečíst o celé implementaci a jak je daný modul propojen se systémem Fitcrack. Nakonec provedeme několik experimentů, ve kterých předvedeme, jak tento modul funguje a zaměříme se i na rychlost generování, paměťové nároky a rychlost vyhledávání.
Advanced Password Testing
Škuta, Matúš ; Januš, Filip (referee) ; Malinka, Kamil (advisor)
Cieľom tejto diplomovej práce je získať poznatky v oblasti zabezpečenia hesiel a následne ich využiť pri tvorbe nástroja na kontrolu hesiel. Dôraz je kladený hlavne na analýzu hádania hesiel. V tejto práci sú analyzované rôzne metódy hádania hesiel a následne porovnávané s výsledkami získanými Parishom. Potom používame vygenerované heslá od hádačov hesiel na vytvorenie slabého súboru údajov, ktorý analyzujeme rôznymi metódami. Poznatky získané z analýzy sa použijú na vytvorenie reaktívnej a proaktívnej kontroly hesiel. V závere práce je otestovaná a vyhodnotená účinnosť vytvorených hádačov hesiel.
Digital footprint on own computer and the Internet
Charvát, Daniel ; Halbich, Čestmír (advisor) ; Očenášek, Vladimír (referee)
The aim of the bachelor thesis is to define types of digital footprints and introduce the methods of the protection of personal data. The partial aim of this thesis is to compare the tools to protect the data and determine if we can eliminate our digital trace. If not, propose appropriate protection of the data and solution for the common user. At the beginning it is said, what is the concept of digital footprint and what kinds are divided. Subsequently there is a description of the risks of misuse of digital footprints. In other chapters there is analysed checking and the options how to minimize it. In the practical part, there is a comparison of the software.
Digital footprint on own computer and the Internet
Větrovský, Jiří ; Halbich, Čestmír (advisor) ; Očenášek, Vladimír (referee)
Bachelor thesis is dedicated to the problematics of digital footprints, to what extend the user is able to control it and protect his privacy by the use of freely available tools. In the first part the term digital footprint is analysed from several different points of view and the risks linked to their creation are explained. It is clarified how one can find the extent of his digital footprint and how to manage it. Next tools for providing protection from tracking, software for ensuring anonymity in the internet environment and techniques for potential removal of an existing footprint are analysed. The practical part is dedicated to choosing the right tools from the previous chapter and their mutual comparison for the purpose of finding out to what extend the user is able to protect his privacy and avoid possible risks. Conclusions are made from the results of the comparisons.
Analysis of security access to internet banking via mobile devices
Hiršal, Michael ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
The objective of this thesis is to analyze and review external security of mobile applications providing mobile banking on Android operating system. The theoretical section is aimed to describe the prerequisites for security analysis and the technological design of security for this kind of applications. Related practical section is based on the data acquired by the author in which the technological security is examined. Products of the companies Air Bank, a.s. and Moneta Money Bank, a.s. were selected to be examined in the practical section. These two companies are sample of the current Czech bank market. The examined level of security of both of the applications and their comparison are covered in the conclusion of the thesis.
Digital footprint on own computer and the Internet
Skalický, Pavel ; Halbich, Čestmír (advisor) ; Gojda, Ondřej (referee)
The aim of my work is finding ways of how the user is able to control their digital footprint. Finding a negative impact on the user and his identity. All tests performed on the freely available tools. At the beginning of the introduction to the concept of digital track, different views on these tracks. There is described the emergence of digital tracks and then formulated a precaution against leaving digital traces. Said there are risks for when leaving digital traces. In the practical part, a test tool for hiding digital tracks, and detecting tracking tools. Getting to what extent can protect against attacks. The subsequent recommendation to certain instruments.
Digital footprint on own computer and the Internet
Kleinander, Michal ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
This work is focused on digital footprint and security. The basic terms and distribution of digital footprints are briefly described in the chapters. There are also described potential risks and threats that may occur due to misuse of digital footprints. The theoretical part is ended by the ways to control digital footprints and their management including the overview of tools. The practical part is focused on testing and comparison of selected tools for privacy protection. On the basis of comparison tools is provided a suitable solution in protection of digital footprint.
Digital footprint on own computer and the Internet
Tomovič, Štefan ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
The main aim of this thesis is to characterize various types of digital footprint and describe the methods of data protection. This conservation uses freeware tools. The theoretical part describes the types of digital footprint, the possibility of misuse of digital footprint and attacks on the computer or data. The next chapter describes the used freeware tools. Their basic characteristics and their use. In the practical part, these instruments are divided into three groups, depending on the region the problems that it solves. According regions are also chosen criteria. In the last part, these instruments are tested each other, using multi criteria analysis.
One-time passwords
Odvárko, Daniel ; Havránek, Martin (advisor) ; Benda, Petr (referee)
This project deals with one-time passwords and their practical usage. One-time passwords are, as their name implies, passwords, which can be used only one time, so, when someone takes over our password, it's already invalid. Theoretical part of this project focuses on both common passwords, security methods and vulnerability to attackers, and OTP, their individual kinds and types of delivery. Practical part consists of creation of practical demo based on acquired knowledge - web application with authentication based on OTP.

National Repository of Grey Literature : 14 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.