IoT Security

Major: Management of Information Security
Code of subject: 7.125.03.O.002
Credits: 4.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Kenyo Halyna
Semester: 1 семестр
Mode of study: денна
Мета вивчення дисципліни: The purpose of studying the discipline is the formation in students of education of a system of knowledge about the key concepts, principles of construction and functioning mechanisms of the Internet of Things, which make it possible to organize the processes of development, implementation and operation of networks of intelligent objects, as well as to ensure their reliability and protection
Завдання: The study of an educational discipline involves the formation of competencies in students of education: integral competence: • A person's ability to solve tasks of a research and/or innovative nature in the field of information security and/or cyber security. general competences: • Ability to abstract thinking, analysis and synthesis. professional competences of the specialty: • Ability to analyze, develop and support the system of auditing and monitoring the effectiveness of the functioning of information systems and technologies, business/operational processes in the field of information security and/or cyber security of the organization as a whole. professional competences of a professional direction: • Ability to work with information security incidents, perform their assessment, prioritize and analyze incidents.
Learning outcomes: As a result of studying the academic discipline, the student must be able to demonstrate the following program learning outcomes: • Integrate fundamental and specialized knowledge to solve complex information security and/or cyber security challenges in broad or multidisciplinary contexts. • Analyze and evaluate the security of systems, complexes and means of cyber protection, technology of creation and use of specialized software. • Clearly and unambiguously convey own conclusions on information security and/or cyber security issues, as well as knowledge and explanations that justify them to staff, partners and others. • Have the skills of autonomous and independent learning in the field of information security and/or cyber security and related 10 fields of knowledge, analyze own educational needs and objectively evaluate learning results. • Use the methods of natural, physical and computer modeling to study processes related to information security and/or cyber security.. Teaching and learning methods: lecture classes - informational and perceptive method, problem presentation method; laboratory work - reproductive method, heuristic method; independent work is a research method. Methods of evaluating the achievement of learning outcomes: current check in the process of assimilation of each topic being studied; assessment of activity in the course of lectures; oral examination of the assimilation of knowledge acquired in the process of performing laboratory work; exam - test control and oral survey.
Required prior and related subjects: Pre-requisites: • Computer networks • Security of computer network infrastructure Co-requisites: • Complex authorized access systems • International cyber security standards
Summary of the subject: The educational discipline is devoted to the study of the principles of construction and functioning of the Internet of Things, as well as the practical use of these systems in various sectors of the economy and spheres of human life. Within the academic discipline, the main provisions and architecture of the Internet of Things are considered, technologies, hardware, protocols and platforms of the Internet of Things are highlighted. In the training process, emphasis is placed on consideration of threats, vulnerabilities, risks and main areas of activity for ensuring the security of the Internet of Things.
Опис: Definition of the Internet of Things. Internet of Things architecture and design. Identifiers in IoT. Core Functional Stack and IoT Compute and Data Management Stack. Identifiers in IoT. Sensors. Executive mechanisms. Non-IP Based WPAN. IP-Based WPAN and WLAN. Long-Range Communication Systems and Protocols (WAN). IoT Edge to Cloud Protocols. Routers and Gateways. Cloud and Fog Topologies. Data Analytics. IoT Security. Using the Internet of Things.
Assessment methods and criteria: Current monitoring of lectures and laboratory classes is carried out with the aim of clarifying the circumstances of the educational process, determining its results in the following forms: • preliminary detection of the level of knowledge of education seekers before the start of classes; • current check in the process of assimilation of each topic being studied; • evaluation of the activity of education seekers in the course of classes; • periodic testing of knowledge and skills of education seekers by section; • checking the performance of laboratory work; • oral survey of knowledge acquired in the process of performing laboratory work. Final (examination) control is carried out based on the results of test control and oral survey.
Критерії оцінювання результатів навчання: • Lab Execution and Report Presentation (30 points) • Final examination control of the theoretical course (60 points written and 10 points oral components)
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: Basic literature 1. Brian Russell, Drew Van Duren. Practical Internet of Things Security. Birmingham, UK: Packt Publishing, 2016. 313 р. 2. Georgios Keramidas, Nikolaos Voros, Michael Hubner. Components and Services for IoT Platforms. Springer International Publishing Switzerland 2017. 383 р. 3. David Hanes, Gonzalo Salgueiro, Robert Barton, Jerome Henry. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA. 2017. 578 р. 4. Simone Cirani, Gianluigi Ferrari, Marco Picone, and Luca Veltri. Internet of Things : Architectures, Protocols and Standards, Published 2019 by John Wiley & Sons Ltd. 2019. 408 р. 5. Perry Lea. Internet of Things for Architects. Birmingham: Packt Publishing 2018. 524 р. Supporting literature 1. Adrian McEwen, Hakim Cassimally. Designing the Internet of Things. Published 2019 by John Wiley & Sons Ltd. 2014. 324 р. 2. Dimitrios Serpanos, Marilyn Wolf Internet-of-Things (IoT) Systems. Springer International Publishing AG 2018. 95 р. 3. Ovidiu Vermesan, Peter Friess. Internet of Things – From Research and Innovation to Market Deployment. River Publishers 2014. 355 p. 4. Ovidiu Vermesan, Peter Friess. Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds. River Publishers 2016. 338р. Information resources 1. https://www.tutorialspoint.com/internet_of_things/index.htm 2. https://www.tutorialandexample.com/iot-tutorial/ 3. https://www.javatpoint.com/iot-tutorial 4. https://www.i-scoop.eu/internet-of-things-guide/ 5. https://www.totalyatra.com/iot-tutorial/ 6. https://www.gangboard.com/blog/iot-tutorial 7. https://www.cisco.com/c/en/us/solutions/internet-of-things/
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).