The scope of the project is to understand the different types of security attacks which are targetted on a layer 2 infrastructure. Once the attacks are identified , different tools are identified which can be used to simulate the attacks to test if the infrastructure
is vulnerable to the attacks. The tools and the methodology used to conduct the attack is documented. Appropriate defense mechanisms are proposed.
Project Type: Research based study
Buy a report based on your requirement. View the different types of reports Click to View
Final year project topics Click here