User Tools

Site Tools


lab

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
lab [2019/12/04 11:44] ggankhuyaglab [2019/12/09 10:15] ggankhuyag
Line 9: Line 9:
  
 We allow students to conduct interesting experiments using the SOC. For instance, students, as analysts, are assigned to detect and analyze suspicious events or attacks from the network traffic by reconstructing the evidence.  We allow students to conduct interesting experiments using the SOC. For instance, students, as analysts, are assigned to detect and analyze suspicious events or attacks from the network traffic by reconstructing the evidence. 
 +
 +
 +====== IoT Lab ======
 +
 +The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics.
 +
 +{{ :labs:iotlab.png?nolink&500 |}}
  
  
Line 27: Line 34:
  
 {{ :labs:blabschematics.png?nolink&500 |}} {{ :labs:blabschematics.png?nolink&500 |}}
- 
- 
-====== IoT Lab ====== 
- 
-The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics. 
- 
-{{ :labs:iotlab.png?nolink&500 |}} 
  
  
lab.txt · Last modified: 2023/06/01 16:56 by ggankhuyag