National Repository of Grey Literature 14 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Vulnerability Analysis of Data Protection in Selected Company
Strachová, Zuzana ; Vlastimil,, Svoboda (referee) ; Sedlák, Petr (advisor)
The bachelor thesis deals with security assessment in the area of data protection of a part of the information system in a selected company. In my thesis, I examine the security status and security controls in place and try to detect actual or potential vulnerabilities. Based on an analysis performed by means of interviews, using assisted assessment methodology and automated vulnerability-finding method, I suggest security enhancements. The theoretical part of the thesis provides an introduction to the topic of data protection and defines the basic related terms.
Cybersecurity game in OpenStack platform
Huška, Luděk ; Lieskovan, Tomáš (referee) ; Stodůlka, Tomáš (advisor)
The bachelor thesis is about creation of the cybernetic game on the OpenStack platform. The work starts with an explanation of necessary knowledge like: Informational cybernetic and computer security, security threats, and testing of the overall security. In the practical part, there is created a cyber game that focus on exploitation and basic security vulnerabilities. The next part involves analysis ongoing complexity of hardware resources like RAM, CPU, disc, etc. In the end, there is a guideline for a lab exercise, which is made for students and professors or teachers both separated.
Web application for testing web server vulnerabilities
Šnajdr, Václav ; Burda, Karel (referee) ; Smékal, David (advisor)
The Master’s Thesis deals with the design and implementation of a web application for testing the security of SSL/TLS protocols on a remote server. The web application is developed in the Nette framework. The theoretical part describes SSL/TLS protocols, vulnerabilities, recommendations and technologies used in the practical part. The practical part is devoted to the creation of a web application with the process of using automatic scripts to test and display the results on the website with a rating of A+~to~C. The web application also displays a list of detected vulnerabilities and their recommendations.
Design of an audit system for the control of systems and services in a computer network.
Šimkovič, Peter ; Michal,, Plaga (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the design of an audit system with which it will be possible to detect security gaps in a computer network. Detection will take place on the basis of checking predefined ports and services running on them. Based on the output of the audit system, possible measures and rules necessary to correct security gaps will be proposed. The system itself will be designed to ensure its easy implementation for any customer.
Advanced network device scanner
Procházka, Michal ; Blažek, Petr (referee) ; Holasová, Eva (advisor)
The master thesis focuses on problem of identifying device types on a local network. The work explores current methods for device recognition on local networks and examines a survey of open-source tools capable of identifying these devices or gathering additional supplementary information. The discovered tools are compared based on several criteria. Furthermore, a laboratory environment is created for testing the identified tools as well as for testing own implementation. Subsequently, this thesis presents a proposal for the own implementation of a device identification method and the retrieval of advanced information about these devices. The main part of the work focuses on describing several possible methods of device identification, including practical examples. Scripting of the practical examples is implemented in Python or through the command line. Based on the outlined approaches, the thesis presents a list of all recognized devices from the experimental setup. Finally, the methods are compared in terms of network utilization during scanning.
Network Scanner for PowerShell
Sabota, Dominik ; Šeda, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This study focuses on the development and implementation of a network scanning tool for the scripting language Powershell version 5.1 and higher. This tool, named Oculus, was specifically designed for the use of sophisticated network scanning methods during penetration testing and other security audits, thereby becoming part of the broader context of cybersecurity. Within the set requirements and limitations, the Oculus tool was successfully implemented. This work thoroughly analyzes the process of development and implementation of this tool, its limitations, and their impact on overall effectiveness, which is subsequently tested and evaluated. Although the development process brought certain challenges, the testing results confirmed that the Oculus tool provides valuable outputs, thereby confirming its usability in the matter of improving cybersecurity.
Advanced network device scanner
Procházka, Michal ; Blažek, Petr (referee) ; Holasová, Eva (advisor)
The master thesis focuses on problem of identifying device types on a local network. The work explores current methods for device recognition on local networks and examines a survey of open-source tools capable of identifying these devices or gathering additional supplementary information. The discovered tools are compared based on several criteria. Furthermore, a laboratory environment is created for testing the identified tools as well as for testing own implementation. Subsequently, this thesis presents a proposal for the own implementation of a device identification method and the retrieval of advanced information about these devices. The main part of the work focuses on describing several possible methods of device identification, including practical examples. Scripting of the practical examples is implemented in Python or through the command line. Based on the outlined approaches, the thesis presents a list of all recognized devices from the experimental setup. Finally, the methods are compared in terms of network utilization during scanning.
Impact Of Active Scanning On The Industrial Control Networks
Pospíšil, Ondřej
This article deals with the impact of active scanning on industrial networks. The impacton industrial networks is commented from the perspective of the penetration tester methodology.This topic is important because active scan tools are affordable and easy to use, and their intrusiveimpact on industrial devices can be critical. The article’s main goal was to evaluate the impact on theindustrial network from the penetration tester point of view using the most popular tools for activenetwork scanning. In order to demonstrate and evaluate the results, an industrial testbed based on realindustrial hardware was built for the article. The article also demonstrated how to use the informationobtained by scanning for a Denial of Service attack.
Design of an audit system for the control of systems and services in a computer network.
Šimkovič, Peter ; Michal,, Plaga (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the design of an audit system with which it will be possible to detect security gaps in a computer network. Detection will take place on the basis of checking predefined ports and services running on them. Based on the output of the audit system, possible measures and rules necessary to correct security gaps will be proposed. The system itself will be designed to ensure its easy implementation for any customer.
Cybersecurity game in OpenStack platform
Huška, Luděk ; Lieskovan, Tomáš (referee) ; Stodůlka, Tomáš (advisor)
The bachelor thesis is about creation of the cybernetic game on the OpenStack platform. The work starts with an explanation of necessary knowledge like: Informational cybernetic and computer security, security threats, and testing of the overall security. In the practical part, there is created a cyber game that focus on exploitation and basic security vulnerabilities. The next part involves analysis ongoing complexity of hardware resources like RAM, CPU, disc, etc. In the end, there is a guideline for a lab exercise, which is made for students and professors or teachers both separated.

National Repository of Grey Literature : 14 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.