National Repository of Grey Literature 851 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
Security of Testing Farm Service
Havlín, Jan ; Malinka, Kamil (referee) ; Drga, Jozef (advisor)
This thesis deals with security of Testing Farm Service in Red Hat company. Specifically, it is about unauthorized usage of testing machines for purposes which are not allowed. The need for implementing security measures comes from the fact that users are allowed to run arbitrary code on test machines as the user root.    In the implementation part of the thesis, a monitoring agent was created and deployed to the testing machines of the production environment of the service. This system watches transmitted packets, system resources and configuration. Based on these observations, it creates metrics about the system behavior and sends them over to monitoring server Prometheus.
Security and Performance Testbed for Simulation of Proof-of-Stake Protocols
Hud, Jakub ; Perešíni, Martin (referee) ; Homoliak, Ivan (advisor)
Tato práce se zabývá testováním výkonu a bezpečnosti konsensus protokolů typu Proof-of-Stake (PoS). Na teoretické úrovni porovnává protokoly ProPos, Algorand, Hedera, Ouroboros a Tezos z pohledu výkonu, možností útoků a obraně proti těmto útokům. Součástí práce je implementace simulačního frameworku v Omnet++ 5.4.1 pro provádění simulačních experimentů s protokoly ProPos, Algorand a Hedera. Simulace se zabývají zejména výkonem těchto protokolů. Na základě zjištěných výsledků jsou navržena určitá vylepšení.
Security and Performance Testbed for Simulation of Proof-of-Stake Protocols
Holub, Juraj ; Malinka, Kamil (referee) ; Homoliak, Ivan (advisor)
This work aims to analyze the security and performance of three Proof-of-Stake consensus protocols for blockchain (Harmony, Solana and Ouroboros). For this purpose, a simulation tool is created, which experiments with these protocols. The solution also includes a comparison of currently available blockchain simulators. The simulation results show that all three protocols can work efficiently even in large networks. In terms of security, the simulation points to a vulnerability in the form of a DoS attack. Based on the results, modifications to the protocols were proposed that minimize the mentioned security vulnerability. The created simulator is freely available and intended for potential further research of similar consensus protocols.
Smart house
Král, Adam ; Pech, Ondřej (referee) ; Mauder, Tomáš (advisor)
This bacherol’s thesis is describing, how is technology getting into our households and making smart homes. After defying, what is smart home and what is not deals with possibilities of their control, their effect on energy savings and raising of security. In the end there is an example of calculation of budget needed to reconstruct a house into a smart house and discussion about which direction will the trend take in the future.
Liveness Detection of Human Hand from Multispectral Images
Kľučiar, Adam ; Drahanský, Martin (referee) ; Sakin, Martin (advisor)
This thesis is aimed at liveness detection from multispectral palm images. The theoretical part includes the importance of liveness detection in biometry systems and it discusses several methods of liveness detection, hardware and software-based. Subsequently, there is a summary of individual parts of the human skin and an explanation of the light spectrum, its division and the importance of individual parts for liveness detection and their effect on individual parts of the skin. The outcome of this thesis is the design and implementation of an algorithm capable of detecting anorganic hand imitations by their properties acquired from a set of images taken under the light of three different wavelengths.
Secure Coding Guidelines for React
Solich, Filip ; Firc, Anton (referee) ; Malinka, Kamil (advisor)
This work deals with writing secure applications in JavaScript library React. The aim of this work is to create a guide for programmers to be able to detect parts of web applications that can be exploited to attack on the application. It describes how and to what you need to pay attention to when writing web applications, what are the best programming practices in the React library, thanks to which the programmer can avoid security errors in the application code and how to fix any errors. The types of attacks themselves and how attacks on a vulnerable application can take place are also described here. Knowing the progress of the attack will help the programmer to think better about the weak links of the application and thus also detect a security issue in the application before the attacker.
Secure and Usable Password Manager
Haderka, Martin ; Firc, Anton (referee) ; Malinka, Kamil (advisor)
Přístupové údaje jsou nedílnou součástí uživatelů internetu. Jedná se o mechanizmus, který umožňuje prokázání se, že se jedná oprávněnou osobu a zároveň zabraňuje znežití osobních dat cizími uživateli. Počet hesel, který si dnešní uživatel musí zapamovat, se v posledních letech značně navýšil. Existují programy (správci hesel), které tento problém uživatelům ulehčují, a jsou zároveň snadno dostupné. Přesto je používá málo lidí. Cílem této práce je zjištění problémů, které mají dopad na použitelnost správců hesel a zároveň se snaží nabídnout řešení těchto problémů. Součástí analýzy je i nalezení bezpečnostních a použitelnostních nedostatků, kterými aktuálně správci hesel trpí. V poslední části je navržena a implementována ukázka správce hesel, který nabízí důležité funkce, je dostupný a snadno použitelný všemi uživateli internetu.
Security and Usability Analysis of Cryptocurrency Wallets
Brna, Filip ; Homoliak, Ivan (referee) ; Tamaškovič, Marek (advisor)
This thesis aims to analyze the security and usability of cryptocurrency wallets of different categories. The work is focused on familiarizing with the most used cryptocurrency wallets, threats related to their use, subsequent testing of the selected wallets with the proposed test scenarios, and evaluation of the testing supplemented with the definition of several recommendations for their proper use. In the systematic testing, the method of designing test scenarios was used, followed by systematic testing, and finally, the results were evaluated. The research conducted found that the most widely used cryptocurrency wallets achieve a high level of security against the described threats and offer a wide range of possibilities for their use. The results of this work allow users to understand the issues associated with storing and handling cryptocurrencies more efficiently. Based on the results of the testing, the user has the possibility to choose a cryptocurrency wallet precisely according to his user's needs and security requirements.
Secure Coding Guidelines for Python
Zádrapa, Jan ; Holop, Patrik (referee) ; Malinka, Kamil (advisor)
S narůstajícím počtem kybernetických útoků a vzrůstající cenou jejich dopadů se zvyšuje také poptávka po znalosti bezpečného programování. Python jako aktuálně nejoblíbenější programovací jazyk se stal nedílnou součástí této problematiky. Spousta programátorů umí Python používat, ale neumí jej používat bezpečně. Tomuto problému nepomáhá ani to, že samotný Python nemá dostatek pokynů a výukových materiálů pro bezpečnostní problematiku. Cílem této práce je informovat o největších bezpečnostních hrozbách programování v Pythonu a zároveň zajistit řešení těchto situací. Zaměření práce je na poučení veřejnosti pomocí výukových materiálů v podobě pokynů a výukové pomůcky. Výuková pomůcka v podobě webové aplikace by měla být přehledná a použitelná pro veřejnost. Součástí aplikace je také několik příkladů implementace zranitelností z reálného světa.
Analyzer of Web Application Optimization and Security
Štrbák, Boris ; Polčák, Libor (referee) ; Bednář, Martin (advisor)
The goal of this project was to create a web application that would automate the regular analysis of individual pages of the site and present obtained information to the user. Final product is a Single-Page application (SPA) created using JavaScript framework Vue.js with the Vuetify library. The server part, which contains REST API and scanning and analysis processes, is implemented in the PHP framework Laravel. Both parts are designed to run in a containerized environment. Docker is used for this purpose. The first part of the thesis describes the issues of site optimization, security and SEO. The mentioned findings were then used in the implementation itself.

National Repository of Grey Literature : 851 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.