• A
  • A
  • A
  • АБB
  • АБB
  • АБB
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта
Магистратура 2019/2020

Кибербезопасность и Интернет вещей

Лучший по критерию «Полезность курса для Вашей будущей карьеры»
Лучший по критерию «Полезность курса для расширения кругозора и разностороннего развития»
Направление: 11.04.02. Инфокоммуникационные технологии и системы связи
Когда читается: 1-й курс, 3 модуль
Формат изучения: с онлайн-курсом
Прогр. обучения: Интернет вещей и киберфизические системы
Язык: английский
Кредиты: 4
Контактные часы: 2

Course Syllabus

Abstract

You will explore current security and privacy related concerns in each of these areas. Every module will include readings, videos, case studies, and a quiz to help make sure you un-derstand the material and concepts we talk about. This course offers a place to learn, reflect, and plan for a smart community approach to IoT. Portions of this course may seem extremely tech-nical in nature. That is because the “things” in IoT represents engineering. Try to grasp the con-cept in that case. https://www.coursera.org/learn/iot-cyber-security
Learning Objectives

Learning Objectives

  • This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught up to the internet capabilities of some of our most common products. The “connected home”, “consumer wearables”, or even an employee’s HVAC system may cause an unanticipated threat to your business environment. You will explore current security and privacy related concerns in each of these areas. Every module will include readings, videos, case studies, and a quiz to help make sure you un-derstand the material and concepts we talk about. This course offers a place to learn, reflect, and plan for a smart community approach to IoT. Portions of this course may seem extremely tech-nical in nature. That is because the “things” in IoT represents engineering. Try to grasp the con-cept in that case.
Expected Learning Outcomes

Expected Learning Outcomes

  • Welcome to Cybersecurity and the Internet of Things!
  • IoT and the Industrial Sector
  • IoT and the Connected Home
Course Contents

Course Contents

  • Module 1: Welcome to Cybersecurity and the Internet of Things!
    Welcome to “Cybersecurity and the Internet of Things”! Your team for this course are ex-perts in the field of cybersecurity and the Internet of Things. Through their research and experi-ence, the team has collaborated to create a course that encompasses the most relevant aspects of cybersecurity and its impact on the Internet of Things. The team consists of Dr. Humayun Zafar, Dr. Traci Carte, Mr. Andy Green, and Dr. Herbert Mattord. All team members are faculty at Kennesaw State University which is one of the largest universities in the state of Georgia. In this course, we will talk about the so-called “Internet of Things” and what it means in the industrial sector, the “connected home”, and “consumer wearables” arenas. Good luck, and we look for-ward to seeing you successfully complete this course! Mr. Green is active on Twitter, follow him at @secprofgreen. He will be tweeting about IoT topics, using the #iotsecmooc tag. Join him there to engage in conversation!
  • Module 2: IoT and the Industrial Sector
    In this module, you will explore how IoT devices are used in the industrial sector. You will explore some of the common devices in use today, learn how they work, and how businesses and consumers benefit. You will also be exposed to some of the security and privacy-related issues found in this sector.
  • Module 3: IoT and the Connected Home
    In this module, we will guide you through some of the more common IoT devices in use in a modern “connected home”, and how they are used. We will also show you some of the big se-curity and privacy-related issues found with these devices, and their use in our homes.
  • Module 4: IoT and Consumer Wearables
    In this module, we will expose you to IoT devices in the consumer wearables sector. You will learn about some of the more popular devices, how they are used, what data they can report about you, and how that data may be used. As with the other modules, we will also help you explore current security and privacy-related concerns that are out there.
Assessment Elements

Assessment Elements

  • non-blocking Онлайн курс
  • non-blocking Экзамен
    Экзамен проводится в устной форме (опрос по материалам курса). Экзамен проводится на платформе Jitsi (http://meet.miem.hse.ru/). К экзамену необходимо подключиться согласно расписанию ответов, высланному преподавателем на корпоративные почты студентов накануне экзамена. Компьютер студента должен удовлетворять требованиям: наличие рабочей камеры и микрофона, поддержка Jitsi. Для участия в экзамене студент обязан: поставить на аватар свою фотографию, явиться на экзамен согласно точному расписанию, при ответе включить камеру и микрофон. Во время экзамена студентам запрещено: выключать камеру, пользоваться конспектами и подсказками. Кратковременным нарушением связи во время экзамена считается нарушение связи менее минуты. Долговременным нарушением связи во время экзамена считается нарушение минута и более. При долговременном нарушении связи студент не может продолжить участие в экзамене. Процедура пересдачи подразумевает использование усложненных заданий. В ходе освоения дисциплины формируются следующие компетенции: УК-1, УК-6, УК-7, УК-8, ОПК-3, ПК-21
Interim Assessment

Interim Assessment

  • Interim assessment (3 module)
    0.5 * Онлайн курс + 0.5 * Экзамен
Bibliography

Bibliography

Recommended Core Bibliography

  • Elk, K. (2019). Embedded Software for the IoT (Vol. Third edition). Boston: De|G Press. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1975740
  • Mendez, D. M., Papapanagiotou, I., & Yang, B. (2017). Internet of Things: Survey on Security and Privacy. https://doi.org/10.1080/19393555.2018.1458258
  • Singer, P. W. . (DE-588)131662260, (DE-627)609812491, (DE-576)31105563X. (2014). Cybersecurity and cyberwar what everyone needs to know Peter W. Singer and Allan Friedman. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edswao&AN=edswao.399723471

Recommended Additional Bibliography

  • Cirani, S., Ferrari, G., Picone, M., & Veltri, L. (2019). Internet of Things : Architectures, Protocols and Standards (Vol. First edition). Hoboken, NJ: Wiley. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1881002
  • Familiar, B., & Barnes, J. (2017). Business in Real-Time Using Azure IoT and Cortana Intelligence Suite : Driving Your Digital Transformation. [United States]: Apress. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1533409
  • Gutschow, E. (2019). Big Data-driven Smart Cities: Computationally Networked Urbanism, Real-Time Decision-Making, and the Cognitive Internet of Things. Geopolitics, History & International Relations, 11(2), 48–54. https://doi.org/10.22381/GHIR11220197
  • The Utilization of Internet of Things (IoT) for Multi Sensor Data Acquisition using Thingspeak. (2018). Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.778289F5