Back close

Course Detail

Course Name Cyber Security in Manufacturing
Course Code 24MU644
Program M.Tech. Manufacturing and Automation​
Credits 3
Campus Coimbatore

Syllabus

Unit 1

An overview of an industrial control system-the industrial control system architecture-the purdue model for industrial control systems- industrial control system communication media and protocols Industrial control system history- modbus and modbus TCP / IP – Profinet-Common IT protocols found in the ICS- Anatomy ICS attack scenario – Attacks-consequences-Risk assessment- Backend protocols-advanced metering infrastructure and smart grid- Industrial protocol simulators.

Unit 2

The converged plant wide Enterprise-The safety zone-the manufacturing zone-the enterprise zone-the CPwE industrial network security framework- Physical ICS security-ICS network security-ICS computer security-ICS Application security-ICS Device security – The ICS cyber security program development process. Introduction to industrial networking- common topologies- network segmentation-network services- Wireless networks-Remote access – performance considerations-safety instrumented systems-special considerations.

Unit 3

Consequences of successful cyber incident-cyber security and safety-common industrial targetscommon attack methods- Attack trends-industrial application layer attacks. Cyber security and risk management-methodologies for accessing risk within industrial control system-system characterization-threat identification-vulnerability identification-risk classification and ranking-risk reduction and mitigation. Cyber physical systems – Safety and security of cyber physical systems- Cyber-attacks and measures in cyber-physical systems – Cyber risks in industrial control systems – Costing security solutions -NERC CIP-CFATS-ISA/ IEC62443-mapping Industrial network security to compliance.

 

Objectives and Outcomes

Course Objectives

  • Provide fundamental knowledge on cloud based manufacturing, security challenges and risks associated with different cloud deployment models along with technologies necessary to protect manufacturing systems.
  • Provide working knowledge of using different data mining techniques to identify cyber threats to a manufacturing system.
  • Enable students to detect and prevent system intrusion, improve defense against targeted attacks and incident response, master modern technologies for security of machine tool systems and cyber-physical systems.

 

Course Outcomes

CO

CO Description

CO1

Develop technical expertise in security of cyber-physical systems and explore the security breaches.

CO2

Propose and assess the security solutions for cyber-physical systems.

CO3

Analyze and solve cyber security and system safety issues in cyber-physical systems

CO4

Create security metrics from the vulnerabilities, threats, risks and solutions for cyberphysical systems

CO-PO Mapping

 

PO1

PO2

PO3

PO4

PO5

PO6

CO1

3

1

1

2

1

 

CO2

3

1

1

2

1

 

CO3

3

1

1

2

1

 

CO4

3

1

1

2

1

 

 

Skills Acquired

Knowledge on security threads, design of CPS with network security features.

Text Books / References

  1. Pascal Ackerman, “Industrial Cyber security-Efficiently secure critical infrastructure systems”, Packt Publishing Ltd., Bringham, 2017.
  2. Eric Knapp and Joel Thomas Langill, “Industrial Network Security- Securing Critical Infrastructure Networks for smart Grid, SCADA, and other Industrial Control Systems” Syngress is an Imprint of Elsevier, 2015.
  3. Lihui Wang, Xi Vincent Wang, “ Cloud-Based Cyber –Physical systems in Manufacturing”, Springer Nature, 2018
  4. Edward J.M. Colbert and Alexander Kott, “Cyber-Security and SCADA and other Industrial control Systems” Springer International Publishing AG Switzerland,2016

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now