What Internet of things would be to consumers, SCADA and Industrial control systems would be to enterprises, the heavy machinery that we have been thinking of its intelligent management is going to be completely taken over by the technology. Although it looks like a great boon however if take over, we have seen in the past some of the national critical infrastructures of some very developed countries being compromised and the damages happening which are irreversible hence it becomes most important to understand the cyber risks that such technologies posses and to give the education of the best practices followed for securing such technologies.
Unit I: Introduction
Network Segmentation and Segregation , Boundary Protection, Firewalls , Logically Separated Control Network , Network Segregation, Recommended Defence-in-Depth Architecture, General Firewall Policies for ICS , Recommended Firewall Rules for Specific Services , Network Address Translation (NAT), Specific ICS Firewall Issues , Unidirectional Gateways , Single Points of Failure , Redundancy and Fault Tolerance , Preventing Man-in-the-Middle Attacks , Authentication and Authorization , Monitoring, Logging, and Auditing, Monitoring, Logging, and Auditing , Response, and System Recovery
Unit II: Network Segregation
Dual-Homed Computer/Dual Network Interface Cards (NIC) , Firewall between Corporate Network and Control Network , Firewall and Router between Corporate Network and Control Network , Firewall with DMZ between Corporate Network and Control Network , Paired Firewalls between Corporate Network and Control Network , Network Segregation Summary
Unit III: Recommended Firewall Rules for Specific Services
Domain Name System (DNS) , Hypertext Transfer Protocol (HTTP) ,FTP and Trivial File Transfer Protocol (TFTP) ,Telnet ,Dynamic Host Configuration Protocol (DHCP) , Secure Shell (SSH) ,Simple Object Access Protocol (SOAP) , Simple Mail Transfer Protocol (SMTP), Simple Network Management Protocol (SNMP) ,Distributed Component Object Model (DCOM),SCADA and Industrial Protocols: DNP3 Protocol. Smart Grid Security.
Unit IV Information Hiding Techniques
Introduction to Steganography, Watermarking. Differences between Watermarking and Steganography, A Brief History.Digital Steganography, Applications of Steganography, Covert Communication, Techniques of steganography( for Text and Image) . Steganographic Software: S-Tools, StegoDos, EzStego, Jsteg-Jpeg.
Unit V : Digital Water Marking
Classification in Digital Watermarking, Classification Based on Characteristics: Blind versus Nonblind, Perceptible versus Imperceptible, Private versus Public, Robust versus Fragile, Spatial Domain-Based versus Frequency Domain-Based. Classification Based on Applications: Copyright Protection Watermarks, Data Authentication Watermarks, Fingerprint Watermarks, Copy Control Watermarks, Device Control Watermarks. Watermarking Techniques for Visible and Invisible Watermarks. Watermarking tools: uMark, TSR Watermark.Steganalysis
Disclaimer: Details on this page are subject to change as per University of Delhi guidelines. For latest update in this regard please refer to the University of Delhi website here.