National Repository of Grey Literature 102 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Web Services Security for a Service Consumer
Novotný, Petr ; Weiss, Petr (referee) ; Rychlý, Marek (advisor)
The objective of this project was to introduce to a reader different possibilities of a web security and its authentication. Another part of this project was to create a client application communicates with the web service. The client part should at the some time serve the web services developer for checking chosen web securities.
Security analysis of network protocols
Bednařík, Jan ; Sobotka, Jiří (referee) ; Hajný, Jan (advisor)
The aim of my bachalor’s thesis is security of net protocols analysis. Because of the huge number of net protocols, I’ve decided to choose only a few of them to describe. My task is to describe the TCP/IP model structure in term of security, so I have chosen to devide my thesis into two separate parts. The first part contains describtions of particular TCP/IP layers and adumbration of possibilities of securing. The second part contains more accurate describtions of some chosen protocols, mostly the case of their security. At the close of my work it is my task to describe some utilities and methods which can be used to accomplish an successful attack on chosen net protocols. I have chosen protocols HTTP, FTP and SSL. As the utilities I have chosen programs Wireshark, Brutus and SSLSTRIP.
Communication systems based on IP telephony
Zimek, Josef ; Kapoun, Vladimír (referee) ; Herman, Ivo (advisor)
My master’s thesis is focused on designing and creating communication network, which provides communication between two independent networks through encrypted tunnel. My solution is based on routers formed by older personal computers with FreeBSD like a operating system. Between routers is created static encrypted tunnel by using IPSec protocol. Voice services provides packet oriented exchange Asterisk with support of signaling protocol SIP. This solution can be used eg. for connecting remote branch to headquarters of company and then can branch utilize shrared resources. To headquarters can connect also remote workers from their home. In this case are used SSL certificates to authentication of user. This scenario is very required today.
Centralised web-based personal data management system
Mazur, Kornel ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
This diploma thesis deals with a central user identification and personal data management on the Internet. The first part analyzes questions of a identification process and discusses the requirements for implementation, security and user-friendliness. Subsequently, the process is designed with respect to the defined requirements. A detailed overview of possible attacks to the system and means of protection against them is also included in the thesis. The described methods are as follows: Phishing, Man in the middle, hardware modification and acoustic keypress emissions. A practical design of a identification system is discussed in the second part of the thesis. It consists of two parts: a library implementable to individual Internet services requiring a user identification and a server centrally identificating the users and storing their personal data and passwords. An implementation in Joomla content management system is also described.
Wireless PC controll
Macháček, Jiří ; Burian, František (referee) ; Macho, Tomáš (advisor)
This work deals with design of PC remote control, which is able to control computer with operating system Windows and Linux using Wifi connection. There was also created necessary support software for both operating systems. Communication was secured by ciphering algorithm.
Secure communication between data logger and database server
Ferek, Matúš ; Doležel, Radek (referee) ; Svoboda, Radomír (advisor)
This work is aimed to analyze security risks of data transfer in Internet network and to design couple of possible solutions for securing communication between data logger and server for data processing. As a result, solution of securing this data communication by SSL layer was designed.
Facebook Social Network Datamining and Reconstruction of Captured Communication
Bruckner, Tomáš ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
This thesis deals with social network Facebook from perspective of computer forensic science with focus on obtaining sensitive information about tracked users. Its main goal is implementation of the tools for reconstruction of captured communication and Facebook data mining. Core of this application has been implemented in framework for processing of captured communication Netfox.Framework, which is being developed by Faculty of Information Technology, Brno University of Technology. Man-in-the-Middle attack has been used for capturing of decipherable communication. Selenium WebDriver has been used as a tool for data mining. Developed solution is able to reconstruct Facebook conversations between users, addition of new statuses and comments, and interception of sent files. Data mining module is able to obtain public information about tracked users, especially places they recently visited, past and upcoming events, public user details, albums and photos, friendlists and mutual friends with other users. As part of the bachelor thesis, data analysis, implementation of the application, validity testing and benchmark analysis have been performed.
Analysis of data transfer security issues at particular OSI model layers
Kňazovický, Pavel ; Růčka, Lukáš (referee) ; Sobotka, Jiří (advisor)
The aim of this Bachelor's thesis is the analysis of secured data transfer protocols. The very first part is dedicated to the short description of the reference model ISO/OSI. The second one is focused to the secured protocols at particular layers of ISO/OSI model, of which SSL/TLS protocol is closely analysed in the third part. The last part is about often used attacks in the area of computer networks and their services and the basic protection against them is also mentioned.
E-shop design and implementation of company
Horsák, David ; Svoboda, Zdeněk (referee) ; Dvořák, Jiří (advisor)
This diploma work characterizes and analyzes the business company. It contains method of solving problems, consequent on the analysis, solving implementation problems and it is project tools for improve future position of company on market by means of electronic market. For further, it is describe economics analysis of design e-shop and it is implementation in chosen company.
Safe Cryptography Algorithms
Mahdal, Jakub ; Hanáček, Petr (referee) ; Chmelař, Petr (advisor)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.

National Repository of Grey Literature : 102 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.