CEI336 Cyber Security Syllabus:

CEI336 Cyber Security Syllabus – Anna University Regulation 2021

COURSE OBJECTIVES:

1. To understand the Industrial security environment and cyberattacks
2. To analyze and assess risks in the industrial environment
3. To access, design and implement cybersecurity
4. To test and troubleshoot the industrial network security system

UNIT I INTRODUCTION

Industrial security environment-Industrial automation and control system(IACS) culture Vs IT Paradigms-Cyberattacks: Threat sources and steps to successful cyberattacks

UNIT II RISK ANALYSIS

Risk identification, classification and assessment, Addressing risk:Cybersecurity Management System(CSMS), organizational security, physical and environmental security, network segmentation, access control, risk management and implementation.

UNIT III ACCESSING THE CYBERSECURITY OF IACS

Identifying the scope of the IACS- generation of cybersecurity information-identification of vulnerabilities- risk assessment-evaluation of realistic threat scenarios- Gap assessmentcapturing Ethernet traffic- documentation of assessment results

UNIT IV CYBERSECURITY DESIGN AND IMPLEMENTATION

Cybersecurity lifecycle- conceptual design process- detailed design process- firewall designremote access design- intrusion detection design

UNIT V TESTING AND MAINTENANCE

Developing test plans- cybersecurity factory acceptance testing- site acceptance testingnetwork and application diagnostics and troubleshooting- cybersecurity audit procedure- IACS incident response

TOTAL : 45 PERIODS

SKILL DEVELOPMENT ACTIVITIES (Group Seminar/Mini Project/Assignment/Content Preparation / Quiz/ Surprise Test / Solving GATE questions/ etc)

1 Analysis of various security tools.
2 Standards in cyber security.
3 Study the steps to remove Passwords from Microsoft Word.
4 Steps to ensure Security of any one web browser (Mozilla Firefox/Google Chrome).
5 Analysis the security vulnerabilities of E-Mail Application.

COURSE OUTCOMES:

CO1 Apply basis of science and engineering to understand Industrial security environment and cyberattacks
CO2 Analyze and assess risks in the industrial environment
CO3 Access the cybersecurity of IACS
CO4 Design and implement cyber security
CO5 Identify the tests and troubleshoots of industrial network security system
CO6 Understand, investigate and explore feasible solution for a moderate industrial problem

REFERENCES:

1 Edward J.M. Colbert and Alexander Kott, Cyber-security of SCADA and other industrial control systems, Springer, 2016.
2 Perry S. Marshalland John S. Rinaldi, Industrial Ethernet, Second edition, ISA, 2004
3 Christopher Hadnagy and Seth Schulman, Human Hacking,Win Friends, Influence People, and Leave Them Better Off for Having Met You, Harper Buisness. January 2021