Syllabus
Unit 1
An overview of an industrial control system-the industrial control system architecture-the purdue model for industrial control systems- industrial control system communication media and protocols Industrial control system history- modbus and modbus TCP / IP – Profinet-Common IT protocols found in the ICS- Anatomy ICS attack scenario – Attacks-consequences-Risk assessment- Backend protocols-advanced metering infrastructure and smart grid- Industrial protocol simulators.
Unit 2
The converged plant wide Enterprise-The safety zone-the manufacturing zone-the enterprise zone-the CPwE industrial network security framework- Physical ICS security-ICS network security-ICS computer security-ICS Application security-ICS Device security – The ICS cyber security program development process. Introduction to industrial networking- common topologies- network segmentation-network services- Wireless networks-Remote access – performance considerations-safety instrumented systems-special considerations.
Unit 3
Consequences of successful cyber incident-cyber security and safety-common industrial targetscommon attack methods- Attack trends-industrial application layer attacks. Cyber security and risk management-methodologies for accessing risk within industrial control system-system characterization-threat identification-vulnerability identification-risk classification and ranking-risk reduction and mitigation. Cyber physical systems – Safety and security of cyber physical systems- Cyber-attacks and measures in cyber-physical systems – Cyber risks in industrial control systems – Costing security solutions -NERC CIP-CFATS-ISA/ IEC62443-mapping Industrial network security to compliance.
Objectives and Outcomes
Course Objectives
- Provide fundamental knowledge on cloud based manufacturing, security challenges and risks associated with different cloud deployment models along with technologies necessary to protect manufacturing systems.
- Provide working knowledge of using different data mining techniques to identify cyber threats to a manufacturing system.
- Enable students to detect and prevent system intrusion, improve defense against targeted attacks and incident response, master modern technologies for security of machine tool systems and cyber-physical systems.
Course Outcomes
CO
|
CO Description
|
CO1
|
Develop technical expertise in security of cyber-physical systems and explore the security breaches.
|
CO2
|
Propose and assess the security solutions for cyber-physical systems.
|
CO3
|
Analyze and solve cyber security and system safety issues in cyber-physical systems
|
CO4
|
Create security metrics from the vulnerabilities, threats, risks and solutions for cyberphysical systems
|
CO-PO Mapping
|
PO1
|
PO2
|
PO3
|
PO4
|
PO5
|
PO6
|
CO1
|
3
|
1
|
1
|
2
|
1
|
|
CO2
|
3
|
1
|
1
|
2
|
1
|
|
CO3
|
3
|
1
|
1
|
2
|
1
|
|
CO4
|
3
|
1
|
1
|
2
|
1
|
|
Skills Acquired
Knowledge on security threads, design of CPS with network security features.