Both sides previous revisionPrevious revisionNext revision | Previous revision |
en:iot-reloaded:curriculum:security [2023/09/27 08:06] – Added requirements, learning outcoms and book form IOT-OPEN.EU margus | en:iot-reloaded:curriculum:security [2025/03/20 10:57] (current) – [Table] pczekalski |
---|
====== Module: IoT Security ====== | ====== Module: IoT Security (M4) ====== |
| |
| **Study level** | Master || | | **Study level** | Master || |
| **ECTS credits** | 3 || | | **ECTS credits** | 3 || |
| **Study forms** | Hybrid or fully online || | | **Study forms** | Hybrid or fully online || |
| **Course aims** | The aim of the course is to give an introductory overview to the security issues pertaining IoT solutions and what are the usual topics that are needed to consider from a security point of view when building an IoT system. || | | **Module aims** | The module aims to give an introductory overview of the security issues pertaining to IoT solutions. What are the usual topics that need to be considered from a security point of view when building an IoT system? || |
| **Pre-requirements** | The student/learner has based following modules:\\ - Introduction to IoT\\ - IoT Architectures, inc. Networks || | | **Pre-requirements** | The student/learner has based following modules:\\ - [[en:iot-reloaded:curriculum:general|Introduction to IoT]]\\ - [[en:iot-reloaded:curriculum:networks|IoT Architectures, inc. Networks]] || |
| **Learning outcomes** | After completing this course, the student:\\ - has overview of cybersecurity concepts in IoT systems\\ - understands the cybersecurity challenges and vulnerabilities in IoT system\\ - knows how to secure and defend IoT systems against cyber attacks\\ - can implement best cybersecurity practices on IoT systems || | | **Learning outcomes** | After completing this module, the student:\\ - has an overview of cybersecurity concepts in IoT systems\\ - understands the cybersecurity challenges and vulnerabilities in IoT system\\ - knows how to secure and defend IoT systems against cyber-attacks\\ - can implement best cybersecurity practices on IoT systems || |
| **Topics** | __Topic - Cybersecurity in IoT systems__\\ Cybersecurity concepts\\ IoT Cybersecurity challenges\\ Vulnerabilities in IoT systems\\ Cybersecurity issues and threats in IoT systems\\ Typical attack patterns on IoT systems\\ Best practices of attack detection and mitigation\\ Best practices of defense designs\\ Procedures and other countermeasures || | | **Topics** | __[[en:iot-reloaded:cybersecurity_in_iot_systems|Topic - Cybersecurity in IoT systems]]__\\ [[en:iot-reloaded:cybersecurity_concepts]]\\ [[en:iot-reloaded:hardware_and_cybersecurity]]\\ [[en:iot-reloaded:iot_cybersecurity_challenges]]\\ [[en:iot-reloaded:vulnerabilities_in_iot_systems]]\\ [[en:iot-reloaded:cybersecurity_issues_and_threats_in_iot_systems]]\\ [[en:iot-reloaded:typical_attack_patterns_on_iot_systems]]\\ [[en:iot-reloaded:iot_database_security]] || |
| **Type of assessment** | Prerequisite of a positive grade is a positive evaluation of course topics and presentation of practical work results with required documentation || | | **Type of assessment** | The Prerequisite of a positive grade is a positive evaluation of module topics and presentation of practical work results with required documentation || |
| **Blended learning** | ADD || | | **Blended learning** | Along with an MOOC course in hybrid mode. || |
| **References to\\ literature** | 1. IOT-OPEN.EU, [[https://iot-open.eu/iot-coursebook/| Introduction to the IoT]], 2019\\ 2. Book 2 || | | **References to\\ literature** | 1. Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab, Ethical hacking for IoT: Security issues, challenges, solutions and recommendations, Internet of Things and Cyber-Physical Systems 3 (2023) 280–308, Elsevier. \\ 2. Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Diaz, Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures, Sensors, MDPI.\\ 3. Cybersecurity: A self-teaching introduction by C. P. Gupta and K. K. Goval, M ERCURY L EARNING AND INFORMATION, Dulles, Virginia. \\ 4. Introduction to cybersecurity by Jeetendra Pande, Uttarakhand Open University, Haldwani.\\ 5. Principles of Cyber Security by DR Babasaheb Ambedkar, Open University. || |
| **Lab equipment** | || | | **Lab equipment** | || |
| **Virtual lab** | || | | **Virtual lab** | || |
| **MOOC course** | || | | **MOOC course** | https://multiasm.eu/mooc/course/view.php?id=9 || |
| |
| |
**General description of the course** | |
| |
Introduction to IoT security;\\ | |
Physical security;\\ | |
End-to-end Data Encryption;\\ | |
Privacy and data storage;\\ | |
Identification and access management;\\ | |