Lecture 1: Course introduction, critical infrastructures, and CPS foundations
- Introduces the course structure, grading, paper-presentation format, and expectations for the semester.
- Defines critical infrastructures through examples like the electricity grid and transportation systems, then explains why their disruption has high societal impact.
- Connects the course to cyber-physical systems, security zones, safety, reliability, and fault tolerance, with the smart grid as a motivating application.
|
Download PDF |
Lecture 2: Industrial Control Systems, core components, and wireless ICS
- Maps the overall ICS picture and explains major building blocks such as PLCs, RTUs, IEDs, HMIs, historians, communication gateways, and field devices.
- Surveys the major types of industrial control systems and the application areas where they are commonly deployed.
- Discusses why wireless links appear in ICS deployments and closes with the Bhopal disaster as a safety-focused case study.
|
Download PDF |
Lecture 3: Network foundations, security principles, and cryptography refresher
- Reviews network types, common topologies, and the OSI versus TCP/IP models that underpin industrial communication.
- Introduces core security goals and concepts including confidentiality, integrity, availability, authenticity, and common attack patterns.
- Covers practical foundations such as security design principles and the basics of Caesar, symmetric, and asymmetric cryptography.
|
Download PDF |
Lecture 4: Control systems background and the ICS threat landscape
- Explains the sensor-controller-actuator model and the difference between open-loop and closed-loop control systems.
- Shows how modern ICT connectivity changed the assumptions of historically isolated industrial environments.
- Surveys organizational, architectural, network, human, and operational threats such as unpatched systems, remote access risk, weak passwords, and low security awareness.
|
Download PDF |
Lecture 5: Layered cyberattacks, industrial networks, and Modbus/DNP3
- Walks through application, transport, network, and data-link layer attacks including DNS abuse, SYN flooding, IP spoofing, ARP spoofing, and buffer overflows.
- Introduces industrial network design ideas such as latency, redundancy, physical versus logical segmentation, and fieldbus versus backend protocols.
- Dives into Modbus framing, variants, security concerns, and hardening recommendations, then previews DNP3.
|
Download PDF |
Lecture 6: Smart grid architecture, resilience, and advanced metering
- Motivates the smart grid through demand, cost, resilience, environmental performance, renewable integration, and electric-vehicle support.
- Surveys generation architectures and common smart-grid components such as substations, gateways, and automation systems while highlighting major manipulation points.
- Introduces AMI and smart meters, including meter internals and how compromise of a gateway, smart meter, or the AMI can affect homes, vehicles, and the wider grid.
|
Download PDF |
Lecture 7: Securing smart grids, monitoring, and drone-era cyber-physical threats
- Covers smart-grid defenses such as zone protection, application whitelisting, antivirus, configuration management, SIEM, and network forensics.
- Maps drone-related attack surfaces across sensors, navigation, air traffic control, fault handling, application, physical, link, network, and AI layers.
- Explains concrete attack examples including GPS jamming and spoofing, collision-avoidance abuse, fail-safe manipulation, and anti-drone response ideas.
|
Download PDF |