lab
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
lab [2019/12/04 11:36] – ggankhuyag | lab [2020/04/20 14:22] – ggankhuyag | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | The security lab has three subsystems that support research and teaching activities at the TU/e Mathematics and Computer Science department. | + | The security lab has three subsystems that support research and teaching activities at the TU/e Mathematics and Computer Science department. The integration of the subsystems gives students and researchers an opportunity to investigate all kinds of security aspects. |
Line 8: | Line 8: | ||
{{ : | {{ : | ||
- | We allow students to conduct interesting | + | We allow students to conduct interesting |
+ | * In 2IMS20 (Cyberattacks, | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | * Pen-testing | ||
+ | * Other project possibilities | ||
+ | |||
+ | |||
+ | ====== IoT Lab ====== | ||
+ | |||
+ | The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics. | ||
+ | |||
+ | {{ : | ||
Line 27: | Line 40: | ||
{{ : | {{ : | ||
- | |||
- | |||
- | ====== IoT Lab ====== | ||
- | |||
- | The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics. | ||
- | |||
- | {{ : | ||
lab.txt · Last modified: 2023/06/01 16:56 by ggankhuyag