Cybersecurity

Course Information
TitleΚυβερνοασφάλεια / Cybersecurity
CodeIHST201
FacultySciences
SchoolInformatics
Cycle / Level2nd / Postgraduate
Teaching PeriodWinter
CoordinatorPanagiotis Katsaros
CommonNo
StatusActive
Course ID600016386

Programme of Study: PMS TECΗNOLOGIES DIADRASTIKŌN SYSTĪMATŌN (2018 éōs sīmera) MF

Registered students: 1
OrientationAttendance TypeSemesterYearECTS
KORMOSElective Courses117.5

Programme of Study: PMS TECΗNOLOGIES DIADRASTIKŌN SYSTĪMATŌN (2018 éōs sīmera) PF

Registered students: 5
OrientationAttendance TypeSemesterYearECTS
KORMOSElective Courses117.5

Class Information
Academic Year2021 – 2022
Class PeriodWinter
Faculty Instructors
Weekly Hours3
Class ID
600200587
Course Type 2011-2015
Knowledge Deepening / Consolidation
Mode of Delivery
  • Face to face
Erasmus
The course is also offered to exchange programme students.
Language of Instruction
  • Greek (Instruction, Examination)
  • English (Instruction, Examination)
Prerequisites
Required Courses
  • IHST102 Internet of Things
Learning Outcomes
IoT security is not traditional cybersecurity, but a fusion of cybersecurity with other engineering disciplines. It addresses much more than mere data, servers, network infrastructure, and information security. Rather, it includes the direct or distributed monitoring and/or control of the state of physical systems connected over the Internet. Cybersecurity, generally does not address the physical and security aspects of the hardware device or the physical world interactions it can have. Digital control of physical processes over networks makes the IoT unique in that the security equation is not limited to basic information assurance principles of confidentiality, integrity, non-repudiation, and so on, but also that of physical resources and machines that originate and receive that information in the physical world. In other words, the IoT has very real analog and physical elements. IoT devices are physical things, many of which are safety-related. Therefore, the compromise of such devices may lead to physical harm of persons and property, even death. The subject of IoT security, then, is not the application of a single, static set of meta-security rules as they apply to networked devices and hosts. It requires a unique application for each system and system-of-systems in which IoT devices participate. IoT devices have many different embodiments, but collectively, an IoT device is almost anything possessing the following properties: - Ability to communicate either directly on, or indirectly over the Internet - Manipulates or monitors something physical (in the device or the device's medium or environment), that is, the thing itself, or a direct connection to a thing Cognisant of these two properties, anything physical can be an IoT device because anything physical today can be connected to the Internet with the appropriate electronic interfaces. The security of the IoT device is then a function of the device's use, the physical process or state impacted by or controlled by the device, and the sensitivity of the systems to which the device connects. We expect that in the frame of this course the students will - understand vulnerabilities, attacks, and countermeasures, and methods of managing them - understand how to securely engineer IoT products and systems - understand the the IoT system security lifecycle, which is tightly integrated into a secure development, integration, and deployment process - be familiarised with the background on establishing cryptographic security for IoT implementations and deployments - understand the problems and technical solutions for identity and access management of IoT devices - be familiarised with the privacy principles and concerns introduced by the IoT
General Competences
  • Apply knowledge in practice
  • Retrieve, analyse and synthesise data and information, with the use of necessary technologies
  • Adapt to new situations
  • Make decisions
  • Work autonomously
  • Generate new research ideas
  • Be critical and self-critical
  • Advance free, creative and causative thinking
Course Content (Syllabus)
Threats, vulnerabilities, and risks. Attacks and countermeasures. IoT attacks. Secure design. The secure IoT system implementation lifecycle. Cryptography and its role in securing the IoT. Cryptographic module principles. Cryptographic key management fundamentals. Cryptographic controls for IoT protocols. Introduction to identity and access management (IAM) for the IoT - The identity lifecycle, Authentication credentials, IoT IAM infrastructure, Authorisation and access control. Privacy challenges introduced by the IoT. Performing an IoT Privacy Impact Assessment. Privacy by Design principles. Cloud Security for the IoT.
Keywords
Threats, vulnerabilities and attacks, Security by Design, Cryptography, Access control, Authentication, Privacy, Cloud security
Educational Material Types
  • Slide presentations
  • Book
Use of Information and Communication Technologies
Use of ICT
  • Use of ICT in Course Teaching
  • Use of ICT in Communication with Students
Description
Various audiovisual technologies are used in teaching, as well as the elearning educational platform to support the communication with the students.
Course Organization
ActivitiesWorkloadECTSIndividualTeamworkErasmus
Lectures30
Laboratory Work9
Reading Assigment80
Project40
Written assigments16
Exams48
Total223
Student Assessment
Description
The students will be graded based on their performance in the final written exam. Their grade will get a bonus up to 25% depending on the performance of each student in the individual project that will be assigned during the semester.
Student Assessment methods
  • Written Exam with Multiple Choice Questions (Summative)
  • Written Exam with Short Answer Questions (Summative)
  • Written Assignment (Summative)
  • Performance / Staging (Summative)
  • Written Exam with Problem Solving (Summative)
Bibliography
Additional bibliography for study
1. B. Russel, D. V. Duren, Practical Internet of Things Security, PACKT Publishing, 2016 2. D. Lacamera, Embedded Systems Architecture, PACKT Publishing, 2018
Last Update
25-01-2020