IoT and Cloud Security is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.
CYB802A
Specialisation
800
CYB601A Enterprise and Network Cyber Security
Course level study pre-requisite: a total of 16 credit points (4 subjects) prior to enrolling into the subject.
4 credit points
As the economy and society become increasingly digitally connected, Internet of Things (IoT) and cloud computing. The use of IoT and cloud computing not only improves business processes, but also opens up completely new business opportunities. At the same time, the number of cyber-attacks on IoT and cloud solutions increase and ensuring the confidentiality, integrity, and availability of data processed and transmitted across enterprise boundaries are becoming critical success factors. IoT and cloud security, i.e., ensuring cybersecurity from product design to end-of-life, are becoming key competencies for enterprises.
The goal of the subject is to enable students to design secure IoT and cloud solutions. They will be able to critically analyse threats to IoT and cloud security solutions and translate them into appropriate cyber security measures. It requires a deep understanding of networked digital systems in the IoT and cloud, as well as specific attack vectors. It also requires advanced technical skills in attack techniques and countermeasures.
This subject covers six key areas of IoT and cloud security: (1) fundamentals; (2) IoT and cloud vulnerabilities, attacks and risks; (3) data security; (4) application security; (5) infrastructure security; and (6) regulatory aspects and standards.
a) Identify and critically evaluate threats, risks, and vulnerabilities associated with IoT and cloud solutions.
b) Apply the concepts and guiding principles for designing and implementing appropriate safeguards and countermeasures for IoT and cloud solutions.
c) Conceptually design secure IoT and cloud architectures, considering secure network and storage, data protection at all layers, and end-to-end identity and access management.
d) Implement monitoring and auditing processes and demonstrate compliance with industry and regulatory mandates.
e) Effectively communicate and justify secure IoT and cloud solutions to relevant stakeholders, considering privacy and regulatory issues, employing cyber security best practices and trends
Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.
No | Assessment task | Weighting | Subject learning outcomes to be assessed |
1 | Online Quiz (Invigilated) | 20% | a, b |
2 | Secure IoT and Cloud Development Project | 45% | b, c, d, e |
3 | Secure IoT and Cloud Development Stakeholder Presentation (G) | 35% | a, d, e |
Topic: |
Week 1: Fundamentals of IoT and Cloud Security I
|
Week 2: Fundamentals of IoT and Cloud Computing Security II
|
Week 3: Vulnerabilities, Attacks and Risks in IoT and Cloud Security
|
Week 4: Techniques in Product and Data Level Security
|
Week 5: Techniques in Application Level Security I
|
Week 6: Techniques in Application Level Security II
|
Week 7: Techniques in Application Level Security III
|
Week 8: Techniques in Infrastructure Level Security I
|
Week 9: Techniques in Infrastructure Level Security II
|
Week 10: Privacy and Regulatory Issues
|
Week 11: Standards, Best Practices, and Trends in IoT and Cloud Security
|
Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.