CEI336 Cyber Security Syllabus:
CEI336 Cyber Security Syllabus – Anna University Regulation 2021
COURSE OBJECTIVES:
1. To understand the Industrial security environment and cyberattacks
2. To analyze and assess risks in the industrial environment
3. To access, design and implement cybersecurity
4. To test and troubleshoot the industrial network security system
UNIT I INTRODUCTION
Industrial security environment-Industrial automation and control system(IACS) culture Vs IT Paradigms-Cyberattacks: Threat sources and steps to successful cyberattacks
UNIT II RISK ANALYSIS
Risk identification, classification and assessment, Addressing risk:Cybersecurity Management System(CSMS), organizational security, physical and environmental security, network segmentation, access control, risk management and implementation.
UNIT III ACCESSING THE CYBERSECURITY OF IACS
Identifying the scope of the IACS- generation of cybersecurity information-identification of vulnerabilities- risk assessment-evaluation of realistic threat scenarios- Gap assessmentcapturing Ethernet traffic- documentation of assessment results
UNIT IV CYBERSECURITY DESIGN AND IMPLEMENTATION
Cybersecurity lifecycle- conceptual design process- detailed design process- firewall designremote access design- intrusion detection design
UNIT V TESTING AND MAINTENANCE
Developing test plans- cybersecurity factory acceptance testing- site acceptance testingnetwork and application diagnostics and troubleshooting- cybersecurity audit procedure- IACS incident response
TOTAL : 45 PERIODS
SKILL DEVELOPMENT ACTIVITIES (Group Seminar/Mini Project/Assignment/Content Preparation / Quiz/ Surprise Test / Solving GATE questions/ etc)
1 Analysis of various security tools.
2 Standards in cyber security.
3 Study the steps to remove Passwords from Microsoft Word.
4 Steps to ensure Security of any one web browser (Mozilla Firefox/Google Chrome).
5 Analysis the security vulnerabilities of E-Mail Application.
COURSE OUTCOMES:
CO1 Apply basis of science and engineering to understand Industrial security environment and cyberattacks
CO2 Analyze and assess risks in the industrial environment
CO3 Access the cybersecurity of IACS
CO4 Design and implement cyber security
CO5 Identify the tests and troubleshoots of industrial network security system
CO6 Understand, investigate and explore feasible solution for a moderate industrial problem
REFERENCES:
1 Edward J.M. Colbert and Alexander Kott, Cyber-security of SCADA and other industrial control systems, Springer, 2016.
2 Perry S. Marshalland John S. Rinaldi, Industrial Ethernet, Second edition, ISA, 2004
3 Christopher Hadnagy and Seth Schulman, Human Hacking,Win Friends, Influence People, and Leave Them Better Off for Having Met You, Harper Buisness. January 2021
