Chat with us, powered by LiveChat

IoT and Cloud Security

IoT and Cloud Security is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.

 

Subject Code:

CYB802A

Subject Type:

Specialisation 

Subject Level:

800

Pre- requisite:

CYB601A Enterprise and Network Cyber Security 

Course level study pre-requisite: a total of 16 credit points (4 subjects) prior to enrolling into the subject. 

Credit Points:

4 credit points

Subject Aim:

As the economy and society become increasingly digitally connected, Internet of Things (IoT) and cloud computing. The use of IoT and cloud computing not only improves business processes, but also opens up completely new business opportunities. At the same time, the number of cyber-attacks on IoT and cloud solutions increase and ensuring the confidentiality, integrity, and availability of data processed and transmitted across enterprise boundaries are becoming critical success factors. IoT and cloud security, i.e., ensuring cybersecurity from product design to end-of-life, are becoming key competencies for enterprises.

The goal of the subject is to enable students to design secure IoT and cloud solutions. They will be able to critically analyse threats to IoT and cloud security solutions and translate them into appropriate cyber security measures. It requires a deep understanding of networked digital systems in the IoT and cloud, as well as specific attack vectors. It also requires advanced technical skills in attack techniques and countermeasures.

This subject covers six key areas of IoT and cloud security: (1) fundamentals; (2) IoT and cloud vulnerabilities, attacks and risks; (3) data security; (4) application security; (5) infrastructure security; and (6) regulatory aspects and standards.

Learning Outcomes:

a) Identify and critically evaluate threats, risks, and vulnerabilities associated with IoT and cloud solutions.

b) Apply the concepts and guiding principles for designing and implementing appropriate safeguards and countermeasures for IoT and cloud solutions.

c) Conceptually design secure IoT and cloud architectures, considering secure network and storage, data protection at all layers, and end-to-end identity and access management.

d) Implement monitoring and auditing processes and demonstrate compliance with industry and regulatory mandates.

e) Effectively communicate and justify secure IoT and cloud solutions to relevant stakeholders, considering privacy and regulatory issues, employing cyber security best practices and trends

Assessment Information:

Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.

Broad topics to be covered: 

Topic: 
Week 1:  Fundamentals of IoT and Cloud Security I 

  • Architectural and Technological Components 
  • Principals of IoT Security 
  • Basic Types: IaaS, PaaS, SaaS 
  • Cloud Design Principles: Hardening, Encryption, Layered Defence 
Week 2:  Fundamentals of IoT and Cloud Computing Security II 

  • Introduction to Cloud Platform: AWS 
  • Design Secure Solutions with AWS 
  • Introduction to IoT Architectures and APIs 
  • Constraints and challenges in IoT Design 
Week 3:  Vulnerabilities, Attacks and Risks in IoT and Cloud Security 

  • IoT and Cloud Attack Surface 
  • Shared Cloud Platform Risks and Responsibilities 
  • Cloud Security Risks: IaaS, PaaS, and SaaS 
  • IoT Security Risks 
Week 4: Techniques in Product and Data Level Security 

  • Product Security and IoT Secure Booting 
  • Data Classification and Control 
  • Cloud and IoT Data Life Cycle 
  • Cloud and IoT Storage Architectures 
  • Cloud and IoT Data Security Strategies  
Week 5: Techniques in Application Level Security I 

  • User Identification, Authentication, and Authorisation in IoT and Cloud 
  • Single Sign-On 
  • Federated Identity Management 
  • Multifactor Authentication 
Week 6: Techniques in Application Level Security II 

  • Sandboxing 
  • Application Virtualisation 
  • Tenancy Separation 
  • Coding Flaws  
Week 7: Techniques in Application Level Security III 

  • Cloud Key Management 
  • Cloud Traffic Hijacking Protection 
  • Cloud Resource Access Control 
  • Authentication in IoT Environments 
Week 8: Techniques in Infrastructure Level Security I 

  • Cloud Denial-of-Service Protection 
  • Monitoring, Auditing and Management 
  • Security Information and Event Management in IoT and Cloud 
Week 9: Techniques in Infrastructure Level Security II 

  • Physical Security  
  • Platform Auditing and Controls 
Week 10: Privacy and Regulatory Issues 

  • Cloud security assessment and audit reports 
  • International Laws 
  • Privacy requirements for Cloud computing (ISO 27018) 
Week 11: Standards, Best Practices, and Trends in IoT and Cloud Security 

  • IoT and Common Criteria 
  • CSA, NIST and ENISA recommendations for Cloud Security 
  • Trends in IoT and Cloud Security 

Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.