Cyber Physical System Security (CPSS)

Theory Class Timing: Monday - 4.30 pm to 06.30 pm and Thursday 9.50am to 10.50 am

Theory Syllabus.        

Classroom Material [Taken from Multiple Source. Thanks to the Authors and Sources]

If you have any complicated queries, please visit Stack Exchange and upload your query in the respective tags.


Topic Content and Assignments Understanding
Introduction Concept Map Industrial Control System
Understand Cyber Physical System and Security with Concept Map
Need
Possible Components
Industrial Control System Introduction
Explore MITRE Caldera Security Analysis Tool
Control Logic
PLC
PID
PLC Implementation PLC
Analysis of Vulnerabilities in PLC
Use online tool for the PLC setup
Introduction to Languages:
Ladder Logic
Function Block Diagram
Sequential Function Charts
Structured Text
Instruction List
CAN BUS CAN Bus
CAN Bus: Security Issues
Use ICSim for Analysis
Frame Format
Basics of CAN Database
Collision Avoidance
Possible Security Issues (DoS, Data Leakage, False Data Injection)
CAN-HG (CAN-Guard)
FlexRay FlexRay Basics of FlexRay
Brief of LIN
Security Issues
MOD BUS Modbus Frame Format
Variants of MOD Bus
MOD Bus Constraints
Security Issues
Profibus and Profinet Profinet Working of Profibus and Profinet
Advantage of Profinet over MODBus
Security Issues
Multi-master Handling
Supply Chain Security Supply Chain Introduction
SBOM
VEX
Attacks
Standards and Guidelines Security Standards Understanding Different Standards
Operational Technology Vs Information Technology
Supervisory Control and Data Aquisition (SCADA) SCADA Layers
Components
Functionalities
Human Machine Interface
Possible Attacks
Stuxnet
Stealthy Attack
Watermarking (Noise Input)
MQTT and CoAP MQTT and CoAP
Mosquitto (MQTT) and AIOCoAP Library (CoAP)
Packet Format
TLS integration
Authentication
DNP3 DNP3 Introduction
Security Requirement
Cloud Security Cloud Security Need
TPM
Storage Security
Intrusion Detection System IDS and Firewall
practice SNORT and IPtables
Basics
IDS for OT vs IT
Types of IDS
Windows Inbound and Outbound firewall rules
IPtable rules
IoT Security IoT Introduction
Protocols
Security Issues
Standards
Risk Management Risk Mgmt.
Use case with any IT and OT applications
Focus
Assessment Methods
Integration of Safety and Security Risk
Metrics (CVSS)
Digital Twin Digital Twin. Digital Twin Vs Simulation
Benefits
Adversary Model 3D Attack Surface [Sensors, Actuators and CPS dynamics]
Attacks in the Model


Assignment to solve.

Check Your Attendance Here
Corrections in the attendance needs to be done within two days by mailing it to venkat.ta@iiita.ac.in.

Course Instructors: S.Venkatesan

Teaching Assitant (TA): No

References:
Handbook on Securing Cyber-Physical Critical Infrastructure, Sajal K. Das, Krishna Kant, Nan Zhang, Morgan Kaufmann (Elsevier), ISBN 978-0-12-415815-3, Publication: 2012.