Module: CYS6002-20 Securing the Internet of Things
Level: 6
Credit Value: 20
Module Tutor: John Curry
Module Tutor Contact Details: j.curry@bathspa.ac.uk
1. Brief description and aims of module:
The Internet of Things (IoT) is a potentially game changing technology that enables myriad devices to be connected and monitored continuously via the Internet. This enhanced connectivity has led to fascinating innovations such as autonomous vehicles, home automation, enhanced energy management, health monitoring and tools for improving business productivity, as well as many applications that have not yet been considered. IoT has been adopted quickly across almost all industries and domains with the objective of lessening the burden on humans.
As reliance on IoT grows, malicious hacker groups are choosing to target smart systems for cyber attack. This has implications for both organisations and citizens in terms of privacy, financial loss, welfare and disruption. While the number of devices connected to the Internet continues to increase (in the order of billions), so does the number of connection points and scope of data that hackers can exploit. For this reason, the challenge of securing the Internet of Things is one of urgent and widespread concern.
This module examines IoT through the lens of cyber security. We begin with a deep dive into what IoT is, how it works, and what societal benefits it offers. Attention is then turned to the security vulnerabilities of IoT devices and ecosystems in homes and business settings, and the various ways in which threat actors may exploit IoT data for malicious purposes. This supports learning around how to mitigate risks to IoT security through zero-trust principles and security by design. During the module we take time also to build a critical understanding of the data privacy concerns that surround IoT, as well as recent efforts to establish standards and best practice for IoT security.
2. Outline syllabus:
What is IoT and how does it work?
The societal benefits of IoT
System architectures and communication technologies/protocols
The type of scope of data generated by IoT ecosystems
Data proliferation and privacy concerns
Emerging threats and threat actors
IoT security exploits
The race for standardisation
Balancing innovation and risk management
IoT risk mitigation: retrofitting, zero-trust principles and security by design
3. Teaching and learning activities:
Class Hours
Lectures and seminars examine the applications, technologies and benefits of IoT, as well as their security vulnerabilities. You engage some of these vulnerabilities practically in lab sessions, and draw on emerging standards and approaches to securing IoT systems.
Independent Learning
As IoT and IoT security is an evolving topic, it is important that you keep up to date with case studies and developments in the field.
Assessment Type: CW
Description: IoT portfolio.
% Weighting: 50%
Assessment Type: CW
Description: IoT security solution (2,500 words).
% Weighting: 50%