National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Internet of Things (IoT) Security Risks and Threat
Urbanovský, Jozef ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
The bachelor's thesis deals with the issue of security and attacks on the Internet of Things devices. The document addresses nature of Internet of Things, its characteristics and information security. The thesis analyzes dierent protocols and standards used by Internet of Things and types of network attacks. Part of work consists of packet capture analysis from IoT honeypot and showcases discoverd attacks. In fnal part, one specifc IoT device is analyzed in terms of security, around which is created an experimental IoT system. Subsequently this system is penetration tested with dierent attacks, thus creating new datasets.
Industrial field buses and communication
Košťál, Radovan ; Kroupa, Jiří (referee) ; Bražina, Jakub (advisor)
This bachelor’s thesis deals with the issue of industrial fieldbuses and communication. The theoretical part describes the current state of implementation of industrial fieldbuses and the characteristics of individual communication protocols. Options for cybersecurity are also mentioned. The second, practical part, describes the establishment of communication between a simulated PLC in the TwinCAT 3 program and Node-RED environment using the MQTT protocol and Mosquitto broker.
Internet of Things (IoT) Security Risks and Threat
Urbanovský, Jozef ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
The bachelor's thesis deals with the issue of security and attacks on the Internet of Things devices. The document addresses nature of Internet of Things, its characteristics and information security. The thesis analyzes dierent protocols and standards used by Internet of Things and types of network attacks. Part of work consists of packet capture analysis from IoT honeypot and showcases discoverd attacks. In fnal part, one specifc IoT device is analyzed in terms of security, around which is created an experimental IoT system. Subsequently this system is penetration tested with dierent attacks, thus creating new datasets.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.