Learning Outcomes
On successful completion of this module, students should be able to:
- Analyze scientific research papers and describe the role of cyberphysical systems and their needs from a security perspective.
- Analyze security and privacy requirements for various deployment environments.
- Analyze threats and vulnerabilities and methods that can be used by a threat agents to deploy an attack.
- Apply standardized information security management methods that can be used to secure information systems.
- Identify privacy issues and propose privacy-preserving solutions that can efficiently address them.
- Familiarize with open source platforms used for the management of cyberphysical systems and their data.