Checking date: 17/09/2024


Course: 2024/2025

Cyber-security of networks and cyber-physical systems
(18044)
Master in Connected Industry 4.0 (Plan: 426 - Estudio: 357)
EPI


Coordinating teacher: LARRABEITI LOPEZ, DAVID

Department assigned to the subject: Telematic Engineering Department

Type: Compulsory
ECTS Credits: 3.0 ECTS

Course:
Semester:




Objectives
- Learning of basic principles of cyber-security of connected digital systems. - Learning of fundamentals of symmetric and asymmetric cryptography - Learning of the main threats and protection tools - Knowledge of protection architectures in connected industry environments - Hands-on knowledge of security configuration with TLS, WiFi and firewalls.
Skills and learning outcomes
Description of contents: programme
- the cybersecurity problem of CI4.0 - Cryptography concepts: definitions, security services, symmetric key and public/private key encryption. Authentication. Hashing. - Secure end-to-end transport protocols - Cybersecurity threats in CI4.0: malware types. Structure, components and attack vectors. - Techniques and technologies for mitigating threats: attacks and counter-measurements. Firewalls, IDS and SIEMs. - Data protection in networked systems: security in IP. IPsec. VPNs. - Security in wireless communications.
Learning activities and methodology
LEARNING ACTIVITIES OF THE SYLLABUS REFERRED TO MATTERS AF1 Theory class AF2 Practical classes AF4 Laboratory session AF5 Supervision sessions AF6 Group work AF7 Individual work by student AF8 Mid-term and final exam TEACHING METHODOLOGIES RELATED TO MATTERS MD1 Class presentations supported by computing and audiovisual media, where the main matter concepts are developed and the bibliography to complement the students' learning is provided MD2 Critical lectures of texts recommended by the professor: articles, reports, manuals and research papers. MD3 Solving of practical use cases, problems, etc posed by the teacher to individuals or groups. MD4 Presentation and discussion in class, under the professor supervision of topics related to the matter, as well as several pracitcal use cases.
Assessment System
  • % end-of-term-examination 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40




Basic Bibliography
  • Aditya Gupta. The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things. Apress. 2019
  • William Stallings. Cryptography and Network Security: Principles and Practice. . Prentice Hall. 2013
Additional Bibliography
  • Ian Neil. CompTIA Security+ SY0-701 Certification Guide - Third Edition. Packt Publishing, O'Reilly. 2024

The course syllabus may change due academic events or other reasons.