Theory Class Timing: Monday - 4.30 pm to 06.30 pm and Thursday 9.50am to 10.50 am
Theory Syllabus.
Classroom Material [Taken from Multiple Source. Thanks to the Authors and Sources]
If you have any complicated queries, please visit Stack Exchange and upload your query in the respective tags.
Topic | Content and Assignments | Understanding |
Introduction | Concept Map | Industrial Control System Understand Cyber Physical System and Security with Concept Map Need Possible Components |
Industrial Control System | Introduction Explore MITRE Caldera Security Analysis Tool | Control Logic PLC PID |
PLC Implementation | PLC Analysis of Vulnerabilities in PLC Use online tool for the PLC setup | Introduction to Languages: Ladder Logic Function Block Diagram Sequential Function Charts Structured Text Instruction List |
CAN BUS | CAN Bus CAN Bus: Security Issues Use ICSim for Analysis | Frame Format Basics of CAN Database Collision Avoidance Possible Security Issues (DoS, Data Leakage, False Data Injection) CAN-HG (CAN-Guard) |
FlexRay | FlexRay | Basics of FlexRay Brief of LIN Security Issues |
MOD BUS | Modbus | Frame Format Variants of MOD Bus MOD Bus Constraints Security Issues |
Profibus and Profinet | Profinet | Working of Profibus and Profinet Advantage of Profinet over MODBus Security Issues Multi-master Handling |
Supply Chain Security | Supply Chain | Introduction SBOM VEX Attacks |
Standards and Guidelines | Security Standards | Understanding Different Standards Operational Technology Vs Information Technology |
Supervisory Control and Data Aquisition (SCADA) | SCADA | Layers Components Functionalities Human Machine Interface Possible Attacks Stuxnet Stealthy Attack Watermarking (Noise Input) |
MQTT and CoAP | MQTT and CoAP Mosquitto (MQTT) and AIOCoAP Library (CoAP) | Packet Format TLS integration Authentication |
DNP3 | DNP3 | Introduction Security Requirement |
Cloud Security | Cloud Security | Need TPM Storage Security |
Intrusion Detection System | IDS and Firewall practice SNORT and IPtables | Basics IDS for OT vs IT Types of IDS Windows Inbound and Outbound firewall rules IPtable rules |
IoT Security | IoT | Introduction Protocols Security Issues Standards |
Risk Management | Risk Mgmt. Use case with any IT and OT applications | Focus Assessment Methods Integration of Safety and Security Risk Metrics (CVSS) |
Digital Twin | Digital Twin. | Digital Twin Vs Simulation Benefits |
Adversary Model | 3D Attack Surface [Sensors, Actuators and CPS dynamics] Attacks in the Model |
to solve.
Check Your Attendance Here
Corrections in the attendance needs to be done within two days by mailing it to venkat.ta@iiita.ac.in.
Course Instructors: S.Venkatesan
Teaching Assitant (TA): No
References:
Handbook on Securing Cyber-Physical Critical Infrastructure, Sajal K. Das, Krishna Kant, Nan Zhang, Morgan Kaufmann (Elsevier), ISBN 978-0-12-415815-3, Publication: 2012.