Both sides previous revisionPrevious revisionNext revision | Previous revision |
en:iot-reloaded:curriculum:security [2023/05/30 22:40] – karllall | en:iot-reloaded:curriculum:security [2025/03/20 10:57] (current) – [Table] pczekalski |
---|
====== Module: IoT Security ====== | ====== Module: IoT Security (M4) ====== |
| |
Study level: Masters\\ | | **Study level** | Master || |
ECTS credits: 3 credits\\ | | **ECTS credits** | 3 || |
Max number of students: Depends on the hardware available\\ | | **Study forms** | Hybrid or fully online || |
| | **Module aims** | The module aims to give an introductory overview of the security issues pertaining to IoT solutions. What are the usual topics that need to be considered from a security point of view when building an IoT system? || |
**General description of the course** | | **Pre-requirements** | The student/learner has based following modules:\\ - [[en:iot-reloaded:curriculum:general|Introduction to IoT]]\\ - [[en:iot-reloaded:curriculum:networks|IoT Architectures, inc. Networks]] || |
| | **Learning outcomes** | After completing this module, the student:\\ - has an overview of cybersecurity concepts in IoT systems\\ - understands the cybersecurity challenges and vulnerabilities in IoT system\\ - knows how to secure and defend IoT systems against cyber-attacks\\ - can implement best cybersecurity practices on IoT systems || |
Introduction to IoT security;\\ | | **Topics** | __[[en:iot-reloaded:cybersecurity_in_iot_systems|Topic - Cybersecurity in IoT systems]]__\\ [[en:iot-reloaded:cybersecurity_concepts]]\\ [[en:iot-reloaded:hardware_and_cybersecurity]]\\ [[en:iot-reloaded:iot_cybersecurity_challenges]]\\ [[en:iot-reloaded:vulnerabilities_in_iot_systems]]\\ [[en:iot-reloaded:cybersecurity_issues_and_threats_in_iot_systems]]\\ [[en:iot-reloaded:typical_attack_patterns_on_iot_systems]]\\ [[en:iot-reloaded:iot_database_security]] || |
Physical security;\\ | | **Type of assessment** | The Prerequisite of a positive grade is a positive evaluation of module topics and presentation of practical work results with required documentation || |
End-to-end Data Encryption;\\ | | **Blended learning** | Along with an MOOC course in hybrid mode. || |
Privacy and data storage;\\ | | **References to\\ literature** | 1. Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab, Ethical hacking for IoT: Security issues, challenges, solutions and recommendations, Internet of Things and Cyber-Physical Systems 3 (2023) 280–308, Elsevier. \\ 2. Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Diaz, Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures, Sensors, MDPI.\\ 3. Cybersecurity: A self-teaching introduction by C. P. Gupta and K. K. Goval, M ERCURY L EARNING AND INFORMATION, Dulles, Virginia. \\ 4. Introduction to cybersecurity by Jeetendra Pande, Uttarakhand Open University, Haldwani.\\ 5. Principles of Cyber Security by DR Babasaheb Ambedkar, Open University. || |
Identification and access management;\\ | | **Lab equipment** | || |
| | **Virtual lab** | || |
**Course aims** | | **MOOC course** | https://multiasm.eu/mooc/course/view.php?id=9 || |
| |
The aim of the course is to give an introductory overview to the security issues pertaining IoT solutions and what are the usual topics that are needed to consider from a security point of view when building an IoT system | |