National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
Analysis of security and authentication of wireless networks
Kulíř, Tomáš ; Jeřábek, Jan (referee) ; Szőcs, Juraj (advisor)
This master's thesis deals with wireless networks, mainly about the WiFi. It deals with summary of individual security mechanism both theoretically and using them in real hardware. Mainly it is interested in the security of the individual mechanisms and their weaknesses, which cause rupture of security. At each chapter the ideas and methods, that the attackers are trying for infiltration of wireless networks and decrypt encryption WEP, WPA or WPA2, are outlined. The principle of the authentication of the WiFi by the authentication server and its options, which is connected with directory service LDAP, is also explained in this thesis. The penultimate chapter deals with the summary of security mechanisms and references that should be adhered by design of the WiFi for the provision of the high security. The ending of the master's thesis is devoted to social engineering and its most famous representatives.
Advanced filtering operation in the Linux operating system
Janura, Dominik ; Pelka, Tomáš (referee) ; Szőcs, Juraj (advisor)
This thesis is oriented on the subject of advanced filtering operations and network security under Linux operating system. It explains the procedure of creating a simple packet filtering firewall using the netfilter framework and verifies its efectivity. It further examines the options of user identification in peer-to-peer networks using L7-filtering. It contains design of a system that detects traffic in the most used P2P networks. This system’s function is attested by simulating a P2P traffic inside the local network.
The pitfalls of social engineering, prevention and protection
Rytychová, Jana ; Hejda, Jan (advisor) ; Syrovátka, Oldřich (referee)
This bachelor thesis deals with the issue of social engineering, especially from the point of view of threats, which is present for society today. In addition to clarifying the concept itself, the aim of the thesis is to familiarize itself with the most common tools and methods of social engineering, with respect to expansion of information technologies, which is a golden age for the given branch. The output of this thesis is a general manual for the manager. It will form the cornerstone of information security settings and will be an imaginary counterbalance to identified threats and also as a possible tool for employee training.
Information systems security penetration testing
Klíma, Tomáš ; Doucek, Petr (advisor) ; Čermák, Igor (referee) ; Čapek, Jan (referee) ; Štubňa, Ivan (referee)
The aim of this dissertation thesis is to develop new methodology of information systems penetration testing based on analysis of current methodologies and the role of penetration tests in context of IS/IT governance. Integral part of this aim is evaluation of the methodology. The first part of the thesis is devoted to the presentation of history and current state of research in selected area, definiton of basic terms and introduction of role of the penetration tests. This part is followed by the review of relevant sources and comparative study of current methodologies with a goal to identify their weaknesses. Results from this study are further used as a basis for new methodology development. Classification of IS penetration tests types and testing scenarios are also included. The second part includes design of new methodology, at first its history, structure and principles are presented, then its framework is decribed in high level of detail. In the third part the reader can find (theoretical and practical) validation. The biggest scientific contribution is the methodology itself focused on managment of penetration tests (which is the area currently not sufficiently descibed). Secondary contribution is the extensive review and the comparative analysis of current methodologies. Contribution to the economic and technical (practical) application we can mainly see in the development of new methodology which enables companies to improve management of penetration tests (especially planning, operational management and implementation of countermeasures).
Advanced filtering operation in the Linux operating system
Janura, Dominik ; Pelka, Tomáš (referee) ; Szőcs, Juraj (advisor)
This thesis is oriented on the subject of advanced filtering operations and network security under Linux operating system. It explains the procedure of creating a simple packet filtering firewall using the netfilter framework and verifies its efectivity. It further examines the options of user identification in peer-to-peer networks using L7-filtering. It contains design of a system that detects traffic in the most used P2P networks. This system’s function is attested by simulating a P2P traffic inside the local network.
Analysis of security and authentication of wireless networks
Kulíř, Tomáš ; Jeřábek, Jan (referee) ; Szőcs, Juraj (advisor)
This master's thesis deals with wireless networks, mainly about the WiFi. It deals with summary of individual security mechanism both theoretically and using them in real hardware. Mainly it is interested in the security of the individual mechanisms and their weaknesses, which cause rupture of security. At each chapter the ideas and methods, that the attackers are trying for infiltration of wireless networks and decrypt encryption WEP, WPA or WPA2, are outlined. The principle of the authentication of the WiFi by the authentication server and its options, which is connected with directory service LDAP, is also explained in this thesis. The penultimate chapter deals with the summary of security mechanisms and references that should be adhered by design of the WiFi for the provision of the high security. The ending of the master's thesis is devoted to social engineering and its most famous representatives.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.