====== Module: IoT Security (M4) ====== | **Study level** | Master || | **ECTS credits** | 3 || | **Study forms** | Hybrid or fully online || | **Module aims** | The module aims to give an introductory overview of the security issues pertaining to IoT solutions. What are the usual topics that need to be considered from a security point of view when building an IoT system? || | **Pre-requirements** | The student/learner has based following modules:\\ - [[en:iot-reloaded:curriculum:general|Introduction to IoT]]\\ - [[en:iot-reloaded:curriculum:networks|IoT Architectures, inc. Networks]] || | **Learning outcomes** | After completing this module, the student:\\ - has an overview of cybersecurity concepts in IoT systems\\ - understands the cybersecurity challenges and vulnerabilities in IoT system\\ - knows how to secure and defend IoT systems against cyber-attacks\\ - can implement best cybersecurity practices on IoT systems || | **Topics** | __[[en:iot-reloaded:cybersecurity_in_iot_systems|Topic - Cybersecurity in IoT systems]]__\\ [[en:iot-reloaded:cybersecurity_concepts|Cybersecurity concepts]]\\ [[en:iot-reloaded:iot_cybersecurity_challenges|IoT cybersecurity challenges]]\\ [[en:iot-reloaded:vulnerabilities_in_iot_systems|Vulnerabilities in IoT systems]]\\ [[en:iot-reloaded:cybersecurity_issues_and_threats_in_iot_systems|Cybersecurity issues and threats in IoT systems]]\\ [[en:iot-reloaded:typical_attack_patterns_on_iot_systems|Typical attack patterns on IoT systems]]\\ [[en:iot-reloaded:best_practices_of_attack_detection_and_mitigation|Best practices of attack detection and mitigation]]\\ [[en:iot-reloaded:best_practices_of_defense_designs|Best practices of defense designs]]\\ [[en:iot-reloaded:procedures_and_other_countermeasures|Procedures and other countermeasures]] || | **Type of assessment** | Prerequisite of a positive grade is a positive evaluation of module topics and presentation of practical work results with required documentation || | **Blended learning** | Along with MOOC course in hybrid mode. || | **References to\\ literature** | 1. Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab, Ethical hacking for IoT: Security issues, challenges, solutions and recommendations, Internet of Things and Cyber-Physical Systems 3 (2023) 280–308, Elsevier. \\ 2. Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Diaz, Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures, Sensors, MDPI.\\ 3. Cybersecurity: A self-teaching introduction by C. P. Gupta and K. K. Goval, M ERCURY L EARNING AND INFORMATION, Dulles, Virginia. \\ 4. Introduction to cyber security by Jeetendra Pande, Uttarakhand Open University, Haldwani.\\ 5. Principles of Cyber Security by DR Babasaheb Ambedkar, Open University. || | **Lab equipment** | || | **Virtual lab** | || | **MOOC course** | http://edu.iot-open.eu/course/management.php?categoryid=6&courseid=9 ||