• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 8
  • 8
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Bezpečnostní systém s využitím mobilních sítí / Security system using mobile networks

Svoboda, Adam January 2015 (has links)
This master´s thesis deals with design of security system, which transmits captured video using mobile systems. There are chosen representatives of cameras and motion sensors that could be used in the construction. The thesis also deals with the theoretical design of the transmission system, which consists of a camera, a motion sensor, an USB modem and a microprocessor, that manages all operations. There is also a proposed block diagram of a communication method. The security system is designed and tested in various conditions.
2

Android IP kamera / Android IP Camera

Chvála, Jan January 2015 (has links)
The goal of this thesis is to design a system which would allow video data streaming from a mobile device and real time playback using a standard web browser. The technological background and the implementation platform are both part of this thesis. Web Real Time Communications (WebRTC) technology was used for acquiring multimedia data on mobile device. This technology is natively supported in the latest major web browsers and in WebView component (Android version 5.0 and above). Sending push notifications from a server to a mobile device to start the streaming is done with Google Cloud Messaging technology. The resultant system allows a user to start the application on mobile device with easy web browser access. This starts the multimedia stream from device, which can be parametrized and secured by password. The benefit of this thesis is the overview of WebRTC technology and its demonstration. The IP camera implementation shows how easy it is to use the WebRTC in real applications.
3

Identifiering och Utnyttjande av Sårbarheter hos en IP-Kamera / Identification and Exploitation of Vulnerabilities in an IP-Camera

Fjellborg, Joakim January 2021 (has links)
Idag blir det vanligare och vanligare att system såsom kameror eller kylskåp är eller har kapabiliteten att vara anslutna till internet och kommunicera över nätet av sig själva, så kallade IoT-system. Att ett system är anslutet till internet innebär att risken för angrepp på systemet ökar, och att systemet, om infekterat, har potentialen att kommunicera med omvärlden för att exempelvis utföra denial-of-service-attacker. Detta examensarbete undersöker säkerheten hos en internetansluten kamera (IP-kamera). Målet är att identifiera sårbarheter, och om möjligt, utveckla angrepp som utnyttjar sårbarheter hos kameran, för att testa säkerheten hos systemet. Resultatet visar att systemet är sårbart för ett antal olika angrepp, främst man-in-the-middle och cross-site-request-forgery. / Today systems such as cameras or fridges with the capability of being connected to the internet and communicating without human intervention are becoming increasingly common, so called IoT-systems. A system being connected to the internet means that the system’s attack surface is increased, and the system can, if infected, be used by the attacker to communicate with the outside world to perform denial-of-service- or other types of attacks. This thesis examines the security of an internet connected security camera, (IP-camera). The aim is to identify vulnerabilities in the system, and if possible to develop attacks that exploit these vulnerabilities in the goal of evaluating the security of the system. The results show that the system is vulnerable to some attacks, mainly including man-in-the-middle aswell as cross-site-request-forgery based attacks.
4

Cybersecurity Evaluation of an IP Camera

Stroeven, Tova, Söderman, Felix January 2022 (has links)
The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. This project aims to evaluate the cybersecurity of one such device, an IP camera from Biltema. This was done by performing an extensive analysis of the camera, determining possible vulnerabilities, and performing penetration tests based on identified vulnerabilities. The tests included capturing and analyzing network traffic, attempting to crack the camera credentials, and attempting to disable the camera completely. The conclusions were that the camera should not be used for any security applications and is unsuitable to use in situations where one's privacy is important. / Det breda utbudet av prisvärda och kameror med internet uppkopling har medfört helt nya möjligheter. Idag är det till exempel möjligt att hålla koll på sina barn utan att vara i rummet, eller hålla ett öga på hemmet via mobilen. Det är dock nödvändigt att reflektera över om dessa enheter är säkra, för att undvika allvarliga integritetsintrång. Projekets syfte är att utvärdera cybersäkerheten hos en sådan enhet, en IP-kamera från Biltema. Utvärderingen bestod av en omfattande analys av kameran, identifikation av möjliga sårbarheter och utförande av ett antal penetrationstester baserat på de upptäckta sårbarheterna. Testerna omfattade en analys av nätverkstrafik, att försöka knäcka kamerans inloggningssuppgifter samt att försöka inaktivera kameran. Slutsatsen var att kameran inte bör användas inom säkerhetstillämpningar och att den är olämplig i situationer där integritet är viktigt. / Kandidatexjobb i elektroteknik 2022, KTH, Stockholm
5

以4C策略行銷理論分析安全監控產業-以H公司為例

鄭子釗 Unknown Date (has links)
安全監控產業在美國遭受911恐怖攻擊世事件後,加上隨後英國、西班牙、印尼峇里島等陸續遭到爆炸恐怖攻擊,造成嚴重的生命財產損失,因而喚起各國政府對安全防護的重視,所以該產業隨之發展迅速,但也相對的吸引了其它相對低毛利的產業競相跨足進入此一新興產業,而使得原本一個不顯眼的產業一下子熱絡了起來,當然競爭的情況也日益加劇。 安全監控未來的發展將會朝向數位化、網路化以及系統整合方向發展,此乃世界潮流之趨勢,其中又以網路攝影機及NVR網路數位式錄影軟體、DVR數位式錄影機等所扮演之角色日趨重要。 如何在這個具有高度競爭的產業脫穎而出,筆者以波特的五力分析模型及邱志聖的4C策略行銷架構剖析H公司所從事之安控產業的競爭現況後,得到的結論認為: 若單以成本優勢為主要策略而不搭配其產品功能效益是不易成功的,廠商應該以長期投入研發、配合降低成本,以市場需求為導向,而突顯出產品價值才有可能勝出。從長期培養客戶關係著手,隨時提供最新產品資訊或者公司未來將要開發的產品,以降低客戶對現在及未來產品的資訊蒐集成本。與上游供應商保持密切合作關係,如IC設計開發公司智原以及與SONY、 PANASONIC等CCD元件供應商持續合作,並提供良好的售後服務,以降低客戶的道德危機成本等。透過軟體的高度整合以及提供良好的客製化服務及產品,使客戶消除專屬陷入成本的疑慮,以上將是H公司對未來發展重要參考策略,或者可為有意加入此行業的新進者做為參考方向。
6

Forenzní analýza prostředí IoT ze stop síťové komunikace / Forensic Analysis of the IoT Environment from Network Communication Traces

Slámová, Hana January 2021 (has links)
The goal of this master's thesis is a creation of dataset capturing selected users' activities, network analysis of this dataset, design and implementation of method to detect selected users' activities and discussion of achieved results. 4 devices have been chosen for the creation of this dataset.
7

Monitorovací a zabezpečovací systém / Monitoring and Security System

Felix, Martin January 2010 (has links)
This master's thesis deals with design and implementation of system for securing and monitoring objects. The whole system is serving as an application getaway between typical TCP/IP network and heterogeneous network containing different end devices such as security cameras, microphones and some sensors (e.g. for temperature measurement). In case of detected event, the notification is created, recorded and the user is informed via administrative front-end. System can be managed from remote location and data from devices can be shown by web interface. Theoretical part of this project concerns with the analysis of different types of connecting devices and sensors and the possibilities of their usage for the monitoring systems along with description of communications protocols for each end device. The next part deals with the cameras interfaces, content analysis and connectivity with central server. Practical part describes methods and techniques used for implementation of system.
8

Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore

Tortorelli, Brian Alfred 01 January 2012 (has links)
This project expands the outreach of the Canaveral National Seashore to its visitors, potential visitors, and virtual visitors through its goals in conservancy and preservation of its natural resources. This paper is involved with the current iteration of a series of digital media projects, the Sea Turtle Nest Camera, also known as, Turtle Cam. It details how and why this project was designed to be an ongoing initiative to assist in those goals.

Page generated in 0.0537 seconds