Back to Teaching

Course materials

Critical Infrastructure Security (CyS-697)

Download lecture slides and topic summaries for the course.

Lecture Topic Download
Lecture 1: Course introduction, critical infrastructures, and CPS foundations
  • Introduces the course structure, grading, paper-presentation format, and expectations for the semester.
  • Defines critical infrastructures through examples like the electricity grid and transportation systems, then explains why their disruption has high societal impact.
  • Connects the course to cyber-physical systems, security zones, safety, reliability, and fault tolerance, with the smart grid as a motivating application.
Download PDF
Lecture 2: Industrial Control Systems, core components, and wireless ICS
  • Maps the overall ICS picture and explains major building blocks such as PLCs, RTUs, IEDs, HMIs, historians, communication gateways, and field devices.
  • Surveys the major types of industrial control systems and the application areas where they are commonly deployed.
  • Discusses why wireless links appear in ICS deployments and closes with the Bhopal disaster as a safety-focused case study.
Download PDF
Lecture 3: Network foundations, security principles, and cryptography refresher
  • Reviews network types, common topologies, and the OSI versus TCP/IP models that underpin industrial communication.
  • Introduces core security goals and concepts including confidentiality, integrity, availability, authenticity, and common attack patterns.
  • Covers practical foundations such as security design principles and the basics of Caesar, symmetric, and asymmetric cryptography.
Download PDF
Lecture 4: Control systems background and the ICS threat landscape
  • Explains the sensor-controller-actuator model and the difference between open-loop and closed-loop control systems.
  • Shows how modern ICT connectivity changed the assumptions of historically isolated industrial environments.
  • Surveys organizational, architectural, network, human, and operational threats such as unpatched systems, remote access risk, weak passwords, and low security awareness.
Download PDF
Lecture 5: Layered cyberattacks, industrial networks, and Modbus/DNP3
  • Walks through application, transport, network, and data-link layer attacks including DNS abuse, SYN flooding, IP spoofing, ARP spoofing, and buffer overflows.
  • Introduces industrial network design ideas such as latency, redundancy, physical versus logical segmentation, and fieldbus versus backend protocols.
  • Dives into Modbus framing, variants, security concerns, and hardening recommendations, then previews DNP3.
Download PDF
Lecture 6: Smart grid architecture, resilience, and advanced metering
  • Motivates the smart grid through demand, cost, resilience, environmental performance, renewable integration, and electric-vehicle support.
  • Surveys generation architectures and common smart-grid components such as substations, gateways, and automation systems while highlighting major manipulation points.
  • Introduces AMI and smart meters, including meter internals and how compromise of a gateway, smart meter, or the AMI can affect homes, vehicles, and the wider grid.
Download PDF
Lecture 7: Securing smart grids, monitoring, and drone-era cyber-physical threats
  • Covers smart-grid defenses such as zone protection, application whitelisting, antivirus, configuration management, SIEM, and network forensics.
  • Maps drone-related attack surfaces across sensors, navigation, air traffic control, fault handling, application, physical, link, network, and AI layers.
  • Explains concrete attack examples including GPS jamming and spoofing, collision-avoidance abuse, fail-safe manipulation, and anti-drone response ideas.
Download PDF
Back to Teaching