National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Advanced filtering operation in the Linux operating system
Janura, Dominik ; Pelka, Tomáš (referee) ; Szőcs, Juraj (advisor)
This thesis is oriented on the subject of advanced filtering operations and network security under Linux operating system. It explains the procedure of creating a simple packet filtering firewall using the netfilter framework and verifies its efectivity. It further examines the options of user identification in peer-to-peer networks using L7-filtering. It contains design of a system that detects traffic in the most used P2P networks. This system’s function is attested by simulating a P2P traffic inside the local network.
The pitfalls of social engineering, prevention and protection
Rytychová, Jana ; Hejda, Jan (advisor) ; Syrovátka, Oldřich (referee)
This bachelor thesis deals with the issue of social engineering, especially from the point of view of threats, which is present for society today. In addition to clarifying the concept itself, the aim of the thesis is to familiarize itself with the most common tools and methods of social engineering, with respect to expansion of information technologies, which is a golden age for the given branch. The output of this thesis is a general manual for the manager. It will form the cornerstone of information security settings and will be an imaginary counterbalance to identified threats and also as a possible tool for employee training.
Information systems security penetration testing
Klíma, Tomáš ; Doucek, Petr (advisor) ; Čermák, Igor (referee) ; Čapek, Jan (referee) ; Štubňa, Ivan (referee)
The aim of this dissertation thesis is to develop new methodology of information systems penetration testing based on analysis of current methodologies and the role of penetration tests in context of IS/IT governance. Integral part of this aim is evaluation of the methodology. The first part of the thesis is devoted to the presentation of history and current state of research in selected area, definiton of basic terms and introduction of role of the penetration tests. This part is followed by the review of relevant sources and comparative study of current methodologies with a goal to identify their weaknesses. Results from this study are further used as a basis for new methodology development. Classification of IS penetration tests types and testing scenarios are also included. The second part includes design of new methodology, at first its history, structure and principles are presented, then its framework is decribed in high level of detail. In the third part the reader can find (theoretical and practical) validation. The biggest scientific contribution is the methodology itself focused on managment of penetration tests (which is the area currently not sufficiently descibed). Secondary contribution is the extensive review and the comparative analysis of current methodologies. Contribution to the economic and technical (practical) application we can mainly see in the development of new methodology which enables companies to improve management of penetration tests (especially planning, operational management and implementation of countermeasures).
Advanced filtering operation in the Linux operating system
Janura, Dominik ; Pelka, Tomáš (referee) ; Szőcs, Juraj (advisor)
This thesis is oriented on the subject of advanced filtering operations and network security under Linux operating system. It explains the procedure of creating a simple packet filtering firewall using the netfilter framework and verifies its efectivity. It further examines the options of user identification in peer-to-peer networks using L7-filtering. It contains design of a system that detects traffic in the most used P2P networks. This system’s function is attested by simulating a P2P traffic inside the local network.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.