Welcome, Guest . Login . Türkçe
Where Am I: Ninova / Courses / Institute of Science and Technology / BLG 637E / Course Informations
 

Course Information

Course Name
Turkish Bulut ve Bilgisayar Etkileşimli Fiziksel Dizgelerin Güvenliği
English Cloud and Cyber Physical Systems Security
Course Code
BLG 637E Credit Lecture
(hour/week)
Recitation
(hour/week)
Laboratory
(hour/week)
Semester 1
3 3 - -
Course Language English
Course Coordinator Mehmet Tahir Sandıkkaya
Course Objectives The objectives of this course;
1. Inspecting security in cloud
2. Teaching how to achieve data integrity in distributed systems
3. Analyzing effects of security threats in cyber-physical systems
4. Rendering students capable of understanding and detecting vulnerabilities as well as making designs to mitigate them
Course Description Course Description;
Cloud, distributed systems and cyber-physical systems, communication models in distributed systems, fault tolerance in cloud and distributed systems, Byzantine Quorums, distributed file systems, Secure agreement and commitment protocols, Paxos protocol and consensus, availability and resiliency, threats and goals in cloud, effects of deployment models to security of cloud, virtualization in cloud and its security problems, effects of resource pooling to cloud security, methods of preventing privacy leakage in cloud, security threats in cyber physical systems, cost of security, EDoS, DoS and DDoS attacks, applications of cyber-physical systems, IoT, smart-cities, means of production, critical infrastructures. engineering approaches to foresee future threats.
Course Outcomes Course learning outcomes of this course;
1. Recognizing cloud and cloud-related security problems; being able to use measures against threats
2. Being able to identify fault-tolerant, high-availability, resilient distributed systems with data integrity and design them; as well as conduct research on this topic
3. Understanding the effect of security to applications of cyber-physical systems; being able to foresee the security vulnerabilities and being able to prevent attacks.
4. Being able to detect vulnerabilities within the systems covered in the course and avoiding attacks with novel engineering designs
5. Being able to follow up-to-date research covered in the course
Pre-requisite(s)
Required Facilities Students might require using computer laboratories or campus network to access some of the required articles/papers.
Other
Textbook Jajodia, Sushil, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang, eds. Secure cloud computing. Springer, 2014. (978-1461492771)
Other References • Bellovin, Steven M. Thinking Security: Stopping Next Year's Hackers. Addison Wesley Professional, 2015. (978-0134277547)
• Ko, Ryan, and Raymond Choo. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress, 2015. (978-0128015957)
• Vacca, John R., ed. Cloud Computing Security: Foundations and Challenges. CRC Press, 2016. (978-1482260946)
• Yeluri, Raghuram, and Enrique Castro-Leon. Building the Infrastructure for Cloud Security: A Solutions View. Apress, 2014. (978-1430261452)
• Rass, Stefan, and Daniel Slamanig. Cryptography for security and privacy in cloud computing. Artech House, 2013. (978-1608075751)
• Song, H., Fink, G.A., Rosner, G.L. and Jeschke, S. Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. Wiley-IEEE Press, 2017. (978-1119226048)
 
 
Courses . Help . About
Ninova is an ITU Office of Information Technologies Product. © 2024