| |
|
Proposal of process control in production safety valve
Jaša, Aleš ; Prokop, Jaroslav (referee) ; Pernikář, Jiří (advisor)
The aim of this thesis is precise definition of control processes for components of Pressure Limit Valve 5 Generation (PLV5) which is produced by Bosch Diesel Ltd. in Jihlava. The objective was to define measurement methods which ensure identical results of measurement between co. Bosch Diesel Ltd. in Jihlava and suppliers of individual components. The results of this study are introduced into control drawings and described in individual conclusions of the thesis.
|
|
User Authentication and Autorization for New Generation Networks
Přibyl, Radek ; Cvrček, Daniel (referee) ; Matoušek, Petr (advisor)
This document describes methods of user authentication and authorisation via a trusted server. There is analysis of the system Kerberos, which is used as an inspiration for desing of a new authentication scheme. There are analysed programming layers and interfaces for specific applications ensuring user authentication and authorisation. The document contains a design and detailed description of a new authentication scheme. This scheme is implemented into the communication between email client and imap server.
|
|
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
|
|
Secure network based on CISCO systems
Wagner, Zdeněk ; Beran, Jan (referee) ; Macho, Tomáš (advisor)
This work deals with the matter of Virtual Private Network (VPN) utilizing both contemporary and older protocols and the possibilities of their use. Among the most interesting parts there are those presenting various ways of use of the VPN technology, IPSec protocol, IOS SSLVPN and RSA server with HW token ensuring the two-factor user authentication.
|
| |
|
Methods of Authentication to WiFi Network
Valašek, Filip ; Kašpárek, Tomáš (referee) ; Lampa, Petr (advisor)
This diploma thesis deals with authentication using RADIUS protocol and authentication methods in accordance with standard IEEE 802.1X. At the beginning there are shortly characteristics of chosen authentication methods, such as CHAP, PAP and some EAP types. Document includes summary of RADIUS protocols implementations, especially the FreeRADIUS server. Our goal is to implement a management tool to adminitrate FreeRADIUS server.
|
| |
|
Implementation of advanced filters based on packet classification using Linux
Malár, Lukáš ; Holešinský, Pavel (referee) ; Matocha, Tomáš (advisor)
The Master’s thesis ”The Implementation of the Advanced Filtering Based on the Packets’ Classification using Linux” is intended to the realization of an internet gateway. The gateway serves to make the connection between local network and the internet. The thesis contains a short theoretic description of parameters and types of QoS services. The classful and classless queues are mentioned in detail. The last theoretic part refers to the introducing of LDAP protocol and its usage. The practical part of this thesis captures the configuration of firewall, dns and radius server connected with LDAP databases. The thesis also contains detailed description of the production QoS by HTB with L7-filter including the compilation of system’s core. The end of the thesis contains the series of tests of created scripts.
|
|
802.1X Based Wireless Network Security Audit
Antal, Lukáš ; Samek, Jan (referee) ; Drozd, Michal (advisor)
This term project analyzes the security of 802.1X based wireless networks and presents the methodology for auditing these networks. The thesis describes various methods of the EAP authentication protocol used in wireless networks, security risks arising from their usage and recommendations for mitigating these risks. The paper also includes implementation of applications for 802.1X based wireless network audit focusing on the EAP protocol processing.
|