Credits: 5EC
Prerequisites: Network security (NeS)
Motivation: Over the last decade, we have see an increased use of advanced programmable control systems in industry (for the control of industrial manufacturing) processes, in so-called critical infrastructures (water, logistics, gas, energy), as well as in large-scale services (airports, hospitals, etc.) as well as in embedded systems (in-car control systems, car-to-car communications, high-speed train control systems, public surveillance systems, etc.). We also observe an increased use of "standard internet technology" for all this applications. As a consequence, the well-operation of such systems also depends on how well they are protected against malicious attacks.
Synopsis: This course focuses on the challenges of securing the SCADA/ICS and embedded systems against malicious attacks, and the design and evaluation of appropriate countermeasures.
Aim: The course addresses the various types of systems, the possible attacks and counter-measures that can be taken, both at design time, and at operation time (intrusion detection), thereby taking into account the specific requirements of the various systems (costs, energy, space and time constraints) and the impact that security breaches might have (dependability and survivability analysis).
Learning outcomes: After this course, the student:
- Has a good overview of the type of ICT systems being employed in industrial control systems and embedded systems;
- Has the ability to analyse the security risks involved in the such systems;
- Has knowledge about counter-measures and can further refine them;
- Can select (propose, evaluate) suitable counter-measures against security threats, given the application context;
- Can make risk-design-cost trade-offs for security counter-measures;
- Can assess the effect of security breaches and the impact of counter-measures on the primary processes being protected (dependability and survivability analysis).
- Has in-depth knowledge about (i) a selected SCADA/ICS case; (ii) a selected embedded system security case;
Lecturers: Prof Dr Ir Boudewijn Haverkort (UT/EWI)
Examination: Written exam + homework assignments + practical/lab work.
Contents: SCADA, ICS, embedded systems, x-constrained security, risk-cost trade-off, dependability, survivability.
Core text: various papers from the literature.