This course introduces different example applications to illustrate the secure design principles from the physical secure design of the infrastructure, to the security of the hardware and software that underlie the infrastructure, and then to the technical constraints and processes in place to support operational security. Some of the applications that we will study include databases, network security, cloud computing, machine learning, autonomous vehicles, and block chain.
Security Fundamentals; Network Security, Computer Network Security Fundamentals, Security Threats and Vulnerabilities, Dealing with Computer Network Security Challenges; Cloud and Database Security, Cloud Computing, Cloud Security, Homomorphic Encryption, Differential Privacy; End-to-End Security in IoT/cyber-physical systems, Introduction to IoT/CPS, Hardware Security for IoT, Drones and Autonomous Vehicles; End-to-End Security in IoT/cyber-physical systems; Blockchain and Quantum Cryptography, application for IoT and agriculture.
***Registration for course***
Guide to Computer Network Security Book by Joseph Migga Kizza, 3rd Edition, 2015, Springer. Cyber-Physical Systems Security A Survey by Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo, IEEE IoT Journal, 2017. Altawy R, Youssef AM. Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems. 2017 Feb 20;1(2):7. Blockchain Basics - A Non-Technical Introduction in 25 Steps - Springer