Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views3 pages

IoT Security

The IoT Security course aims to equip students with knowledge about operational technology, vulnerabilities, threats, and security issues in IoT systems. It covers various testing tools, penetration testing, and radio and side channel attacks. The course outcomes include summarizing IoT technology, identifying security needs, and classifying IoT security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

IoT Security

The IoT Security course aims to equip students with knowledge about operational technology, vulnerabilities, threats, and security issues in IoT systems. It covers various testing tools, penetration testing, and radio and side channel attacks. The course outcomes include summarizing IoT technology, identifying security needs, and classifying IoT security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

IoT Security

OBJECTIVE

At the end of successful completion of the course, students will be able to:

 Understand theoperational technology of IoT

 Studyvarious vulnerabilities, threats & risks inIoT.

 Explain various IoTsecurity issues.

 Learn different testing tools and different attacks ofIoT

 DescribevariousIoT security needs.

Unit I Introduction to Operational Technology 9

Overview of industrial control systems (ICS), ICS operation &components,Perduemodel,

SCADA systems, Cyber-physical systems (CPS) &IoT

Unit II IoT Vulnerabilities, Threats & Risks 9

STRIDE methodology, OWASP Iot vulnerabilities, Privacy & trust,

Insufficientauthentication/authorization, Insufficient access control, Attacks on IoT data,

Attackson IoT layered architecture, Security concerns in IoT applications, Security concernsin

SCADA

Unit III IoT Pen Testing 9

Active vulnerability analysis tools, Port scanning, Operating system fingerprinting andversion

scanning, Penetration testing, Attack surface mapping

Unit IV Tools, Framework Firmware Reverse Engineering 9

Exploitation Tools & FrameworksExploitation using I2C & SPI, JTAG debugging and

exploitation,Understanding firmware, Extracting firmware, Manual firmware extraction,


Automated file system extraction, Firmware internals, Backdooring afirmware, Static & dynamic

analysis

Module VI Radio & Side Channel Attacks 9

Software defined radio, Exploiting ZIGBEE & BLE, Power analysis attack,Invasive attack,

Perturbation -attacks, Electromagnetic side channel attack, faultinjection attack, timing attack,

covert channel attacks TOTAL: 45 Periods

COURSE OUTCOMES:

Unit K
CO CO Statement
Number Level*

CO 1 Summarize the operational technology of IoT 1 K2

CO 2 Describe various vulnerabilities, threats & risks in IoT. 2 K2

CO 3 Classify various IoT security issues. 3 K3

CO 4 Use different testing tools for IoT 4 K3

CO 5 Identify to secure IoT from different attacks. 4 K3

CO 6 Relate varoiusIoT security needs. 5 K3

CO-PO/PSO Mapping:

Program Outcomes Program

specific
COs
Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO3

CO 1 2 1 2 2

CO 2 2 1 2 2

CO 3 3 2 1 2 2

CO 4 3 2 1 2 2
CO 5 3 2 1 2 2

CO 6 3 2 1 2 2 2

Course 3 2 1 2 2 2 3 2 1

Text Books:

1 “Securing the Internet of Things”, Shancang Li, Li Da Xu, Syngress,Elsevier, 2017

2 “Security and Privacy in Internet of Things (IoTs) Models, Algorithms, andImplementations”,

Edited by Fei Hu, CRC Press, 2016

3 “Practical Internet of Things Security”, Brian Russell Drew Van Duren, PackPublishing, 2016

You might also like