Software Tools and Techniques for Information Security

OData support
Supervisor:
Dávid Zoltán
Department of Automation and Applied Informatics

In the beginning of the 21th century computers, smart phones and the Internet are significant part of our lives. We give up our treasured data easily to the first pop up window, while we use the World Wide Web frivolously. This data could be taken out by malicious people, which can cause you really serious problems. For these reasons in my thesis I will demonstrate, which forms of attacks are the most dangerous and also the most effective nowadays. Furthermore I will show what will happen, if we start to read our e-mails in an open-wireless network, and I will highlight, that in this case which kind of our data could be in danger. At last but not least, I will show how we can effectively hide our data in a form, which is safe despite of the fact, that it can be in view. To illustrate this statement I use my own software, which I developed in order to use it in my thesis in 2011.

I use one of the most popular application to show network attacks. This software is available for everybody and it also is very easy to use. However the tools and techniques are changing fast. For these reasons, my results can be guaranteed until the end of my research. Furthermore there is a possibility - although the probability of it is very low - that tomorrow the experts of the information security will be able to predict DDoS attacks accurately and efficiently.

Downloads

Please sign in to download the files of this thesis.