Version | 1.3 |
Unit Name | IT/OT Cyber Security |
Unit Code | BIA307 |
Unit Duration | 1 Term |
Award |
Bachelor of Science (Engineering) Duration 3 years |
Year Level | Three |
Unit Creator / Reviewer | Dr. Adnan Anwar |
Common/Stream : | Stream (Elective) |
Pre/Co-requisites | N/A |
Credit Points |
3 Total Course Credit Points 81 (27 x 3) |
Mode of Delivery | Online or on-campus. |
Unit Workload | (Total student workload including “contact hours” = 10 hours per week) Pre-recordings / Lecture – 1.5 hours Tutorial – 1.5 hours Guided labs / Group work / Assessments – 2 hours Personal Study recommended – 5 hours |
Unit Description and General Aims
The objective is to impart to students the principles and application of cybersecurity for industrial automation systems. While the advanced and intelligent data-driven Industrial Automation and Control Systems (IACS) has significantly improved manufacturing and process automation, it has opened the door for new vulnerabilities. Especially, the convergence of Information Technology (IT) with the Operational Technology (OT) has merged the internal and external company networks which increased data transfer between systems. As a result, it increased the susceptibility for new and emerging cyber security threats. The subject matter covered in this unit will include: Information Technology, Wireless Communication and Operational Technology security fundamentals and practices, security challenges in the IACS, global cybersecurity standards for IACS, and their defence mechanisms. It also includes critical infrastructure security like industrial energy systems, water, automotive, and supply-chain security. Next, it guides the privacy aspects of industrial data during the automation process. Finally, the cybersecurity risk management framework is discussed and some emerging aspects (e.g., blockchain, smart contracts) related to cybersecurity for Industry 4.0 is presented.
Learning Outcomes
- Discuss the cybersecurity principles for industrial automation systems, demonstrate the ability to explain and apply the current state of the art practices.
Bloom's Level 3 - Identify and analyze cybersecurity risks for IT and OT networks.
Bloom's Level 4 - Evaluate key cybersecurity requirements for Industrial Automation and Control Systems (IACS).
Bloom's Level 5 - Perform cybersecurity risk assessment for IT/OT network.
Bloom's Level 5 - Analyze threat models and countermeasures for IT/OT network.
Bloom's Level 4 - Design a safe and secure system considering IACS security aspects.
Bloom's Level 6
Student assessment
Assessment Type | When assessed | Weighting (% of total unit marks) | Learning Outcomes Assessed |
Assessment 1 Type: Weekly Quizzes (Topic 2-11) Description: Students may complete quizzes with MCQ type answers and solve some simple equations to demonstrate a good understanding of the fundamental concepts. |
Ongoing | 10% | All |
Assessment 2 Type: Test (Invigilated) Description: Students will need to answer some short and/or long answer questions based on the Industrial control system communication protocols, and different aspects of IT/OT security that has been covered from week 4-6. Students can also be asked to design conceptual architectures of IT/OT communication protocols and explain ICS security standards. |
Due after Topic 6 | 25% | 1, 2, 3 |
Assessment 3 Type: Report Description: Students need to perform a comprehensive literature review to investigate key cybersecurity threats which are observed in an ICS setup. The report will also analyze the associated security risks, and possible defense mechanisms. |
Due after Topic 9 | 25% | 4, 5, 6 |
Assessment 4 Type: Examination (Invigilated) Description: An examination with a mix of MCQs, short answer questions, and question related to the design of secured architecture and communication protocol. It will also ask the students to write their self-reflection on the learning related to IT/OT security requirements, and practices. Questions will also examine students' knowledge on global standards related to ICS security and its privacy aspects. |
Final Week | 40% | All |
Overall requirements: Students must achieve a result of 50% or above in the exam itself to pass the exam and must pass the exam to be able to pass the unit. An overall final unit score of 50% or above must be achieved to pass the unit once all assessment, including the exam, has been completed.
Prescribed and Recommended Readings
Textbook:
- Industrial Automation and Control System Security Principles: Protecting the Critical Infrastructure, by Ronald L. Krutz Ph.D. P.E., Second Edition, International Society of Automation, 2016.
- Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman, Packt Publishing, 2017.
- Cyber Security of Industrial Control Systems in the Future Internet Environment, by Mirjana D. Stojanović (University of Belgrade, Serbia) and Slavica V. Boštjančič Rakas (University of Belgrade, Serbia), IGI Global, February 2020.
Reference:
Notes and Reference texts:
- Other material advised during the lectures.
Unit Content
One topic is delivered per contact week, with the exception of part-time 24-week units, where one topic is delivered every two weeks.
Topic 1
Information System Security Fundamentals
- Security Principles (Confidentiality, Integrity, Availability)
- Cryptosystems (hash functions, authentication, encryption)
- Authentication, Authorization, Accounting (AAA)
- Intrusion Detection (characteristics, types, attack responses)
- Virtual Private Networks (VPNs)
- Topic 1 Lab: Covers Symmetric Encryption and Hashing
Topic 2
Communication and Network Layer Security
- Secure Communication Protocols
- Secure Sockets Layer (SSL)
- Transport Layer Security (TLS)
- TCP/IP Layers and security
- Network layer Security - Network Address Translation (NAT)
- Port Scanning, IP Spoofing, DNS Spoofing
- Firewalls (security threats, firewall principles and applications)
- Topic 2 Lab: Practical demonstration on Port Scanning
Topic 3
Wireless network security
- Wireless network Security Practices
- Physical layer security
- WiFi Security
- Securing the industrial wireless network
- Topic 3 Lab: Capturing Wireless Packets via Wireshark and then Cracking WPA2 WiFi Passphrase
Topic 4
Industrial control system communication media and protocols
- Process automation protocols
- Industrial control system protocols
- Building automation protocols
- Automatic meter reading protocols
- Communication protocols in the enterprise zone
- Communication protocols in the Industrial zone
- Common IT protocols found in the ICS
Topic 5
Convergence (and Divergence) of IT & OT Security
- Differences between Information Technology (IT) versus Operational Technology (OT) Paradigms
- Comparison Between IT and Industrial Control and Automation Systems Issues
- Industrial Automation and Control Systems Security Methodologies and Approaches
- NIST Special Publication 800-82, Guide to Industrial Control Systems Security
- ANSI/ISA-TR99.00.01-2007, Security Technologies for Industrial Automation and Control Systems
- North American Electric Reliability Corporation, Critical Infrastructure Protection Cybersecurity Standards
- Considerations in Adopting IT Security Methods to Industrial Automation and Control Systems
- IT and Industrial Automation and Control Systems Comparisons from a Standards Perspective
Topic 6
Global Standards for ICS Security
- International standards and best practices for ICS security
- IEC 62443 and NIST framework
- Cyber security management system
- Risk Analysis and Security Maturity Level based on IEC 62443
- Addressing risk with the CSMS
- Monitoring and improving CSMS
- The International Society for Automation's (ISA) Security Program for IACS (ANSI/ISA-62443-2-1 (99.02.01)-2009)
- ISA's IACS security requirements and security levels (ANSI/ISA-62443-3-3 (99.03.03)-2013)
- The International Organization for Standardization (ISO)'s Security Requirements (ISO/IEC 27001:2013)
- ICS-CERT
- The Australian Cyber Security Centre's (ACSC) guideline towards ICS security
Topic 7
Defending IACS System
- IACS Physical Security
- IACS Network Security
- IACS Computer Security
- IACS Application Security
- IACS Device Security
- NSA's Seven Steps to Effectively Defend IACS
- Lab discussion: Design a safe and secure system considering IACS security aspects
Topic 8
Critical Infrastructure Security
- Energy Grid Security
- AMI System Security Requirements
- United States' Department of Energy's 21 Steps to Improve Cyber Security of SCADA Networks
- Cybersecurity for automotive industry
- Cybersecurity for Water 4.0
- Cybersecurity for Supply-Chain Automation
- Lab Discussion on Power System Cyber Security Examples
Topic 9
Privacy in Automation
- Privacy challenges in the industry 4.0 era
- Australian privacy and data protection laws
- General Data Protection Regulation (GDPR): an Australian perspective
- The NIST's "Security and Privacy Controls for Federal Information Systems and Organizations" (NIST SP 800-53 Rev.4)
- Data Protection Best Practices for Industrial Internet of Things (IIoT) Systems
Topic 10
Security Risk Assessment and Management
- Attacks, objectives, and consequences
- Risk assessments
- Insider Threat
- Threat examples worth to note
- A risk assessment example Step by Step
- Assets Identification and characterization
- Vulnerability Identification and Threat Modelling
- Risk Calculation and Mitigation
- Security assessment tools
Topic 11
Emerging Topics in Industrial Cybersecurity
- Emerging Threats in Industrial IoT system
- New Challenges from Ransomware in IACS
- Insider Threats on the Rise
- Blockchain for Industry 4.0
- Smart Contracts for IACS
- Blockchain Applications in IACS
- Secured Cloud Computing for IACS
Topic 12
Project and Unit Review
In the final week, students will have an opportunity to review the contents covered so far. Opportunities will be provided for a review of student work and to clarify any outstanding issues. Instructors/facilitators may choose to cover a specialized topic if applicable to that cohort.
Software/Hardware Used
Software
-
Software: PSIM (PowerSimTech)
-
Version: N/A
-
Instructions: Y:\Data - ALL.E-Learning\Software\Remote Labs\Instructions for Specific Labs\PSIM
-
Additional resources or files: https://powersimtech.com/drive/uploads/2016/06/PSIM-User-Manual.pdf
Hardware
- 130in1 Electronic Hardware Kit (Optional - to show electronics