CloudIOTsecurityCrsHandout
CloudIOTsecurityCrsHandout
COURSE HANDOUT
Course Description:
This course introduces the security risks involves in the Cloud, IoT & other IT Infrastructure of an Enterprise and
measures to foolproof.
Course Objectives.
No Objective
CO2 To emphasize the specific risks involved in the cloud and IoT infrastructures
CO3 To introduce the identity management and access control in the cloud and IoT infrastructures
Text Book(s)
Aaron Woody, Enterprise Security: A Data-Centric Approach To Securing The Enterprise. 1st ed.
T1
Birmingham: Packt Publishing Ltd., 2013.
Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud
T2
Computing, John Wiley & Sons, 2010
T3 Shancang Li Li Da Xu, Securing the Internet of Things, Syngress, 1st Edition, 2017
Reference Book(s)
R1 Johnson, T. Cybersecurity, CRC Press.2015
R2 Ryan Ko and Kim-Kwang Raymond Choo, The Cloud Security Ecosystem, Syngress, 2015
R3 Chris Dotson, Practical Cloud Security, O'Reilly Media, Inc., 2019
Ian Smith and Don A. Bailey, IoT Security Guidelines for IoT Service Ecosystem, GSM Association, Official
R4
Document CLP.12
Content Structure
Learning Outcomes:
No Learning Outcomes
LO1 Relate an insecure incident to each type of security architecture and estimates the value and risk
propositions to the business
Course Contents
Contac
t
List of Topics Reference
Sessio
n
Security Architectures
2.4. Micro architectures
2.5. Data risk-centric architectures
2.6. BYOD initiatives
3. Security as a Process T1: Chapter
2
2,3
3.1. Risk analysis
3.2. Security policies and standards
3.3. Security exceptions
3.4. Security review of changes
5. Securing Systems
5.1. System classification
5.2. File integrity monitoring
5.3. Application whitelisting
T1: Chapter
4 5.4. Host-based intrusion prevention system
5
5.5. Host firewall
5.6. Anti-virus
5.7. User account management
5.8. Policy enforcement
11. Data Security Schemes for IoT and Social IoT Concerns
11.1. Data Security and Privacy T3: Chapter
10
11.2. Data Confidentiality and Key Management 07,08
11.3. Security Concerns in Social IoT
Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
No Name Type Duration Weight Day, Date, Session, Time
EC-1 Quiz-I/ Assignment-I Online - 5% September 1-10, 2024
Quiz-II Online 5% October 10-20, 2024
Quiz-III/ Online 20%
November 1-10, 2024
Assignment-II
EC-2 Mid-Semester Test Closed 2 hours 30%
Friday, 20/09/2024 (AN)
Book
EC-3 Comprehensive Open 2 ½ hours 40%
Friday, 29/11/2024 (AN)
Exam Book
1. For Closed Book tests: No books or reference material of any kind will be permitted.
Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
2. For Open Book exams: Use of prescribed and reference text books, in original (not photocopies) is
permitted. Class notes/slides as reference material in filed or bound form is permitted. However,
loose sheets of paper will not be allowed. Use of calculators is permitted in all exams.
Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
3. If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student
should follow the procedure to apply for the Make-Up Test/Exam. The genuineness of the reason for
absence in the Regular Exam shall be assessed prior to giving permission to appear for the Make-up
Exam. Make-Up Test/Exam will be conducted only at selected exam centres on the dates to be
announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self-study schedule as
given in the course handout, attend the lectures, and take all the prescribed evaluation components such as
Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.