SlideShare a Scribd company logo
1 of 12
Download to read offline
1
www.cranfield.ac.uk
New MSc Course in Cyber-
Secure Manufacturing
www.cranfield.ac.uk/csm
Hongmei He
h.he@cranfield.ac.uk
08 Nov. 2016
2
Outline
1. Motivation
2. Aim and Objectives of the MSc Course
3. Course Vision and Structure
4. Modules and Course Team
5. Demands of job markets
3
A blast furnace at a German steel mill suffered "massive damage" following a cyber
attack on the plant's network
Motivation
4
Motivation
FY 2014 Incidents Reported by Sectors (245 total)
5
Security Challenges in IoT Enabled Manufacturing
Motivation
 Big Data and Data Protection
IBM estimated that the number of connected devices will increase to 40 billion by 2020. A
huge number of connected devices (including sensors) will produce huge amount of data.
(1) Data driven cyber security
(2) Critical parameter protection in industry systems
(3) Secure data transmission
 Security of Cyber-Physical Systems
(1) Mobile security for mobile accessing to industry systems
(2) Process protection and IoT security
(3) Protect legitimate ICS from cyber-attacks when they are connected to the Internet, as
they are often developed for reliability and performance, not security, which leaves
the systems to predetermined adversaries.
6
Aims and Objectives (UK/EU Only)
 The aim -- to develop the next generation of manufacturing engineers who are able to protect
manufacturing systems, machines and data against cyber threats.
 Objectives -- to enable students to use cutting-edge technologies in IoT, Big Data, Cloud
Computing and Cybersecurity to
1) identify cyber threats in manufacturing systems from the Internet
2) protect manufacturing systems from cyber attacks
3) improve incident response and disaster recovery in manufacturing systems.
4) assess the cost of cybersecurity solutions for manufacturing systems
7
The Vision of the Course Concept
8
Course Structure
May - SeptOct.– Jan.
Group Project
Taught Modules Individual Thesis Project
Feb. – Apr.
Credits:
 40% Taught modules
 20% Group project
 40% Thesis project
9
Short Courses Derived from the MSc Course
Associated to the MSc course (5 days)
 Secure IoT and System Architecture
 Data Mining Techniques for Cyber-Threat
Identification
 Secure Cloud Manufacturing
 Security of Machine Tool Systems
Compressed short courses (3 days):
 Big Data Analytics for Enterprises
 IoT Security for Industry
10
Modules and Course Team
Course Director: Dr Hongmei He
ID Module Name Module Leader Credits
00 Induction Dr Konstantinos Salonitis 0
01 Modern Manufacturing and Security Challenges Prof Tetsuo Tomiyama 10
02 Operations Management A Professor/Reader 10
03 Secure IoT and System Architectures Dr Jörn Mehnen 10
04 Secure Cloud Manufacturing Dr Yifan Zhao and
Dr Christopher Turner
10
05 Enterprise System Engineering Dr Konstantinos Salonitis 10
06 Data Mining Technology for Cyber Threat Identification Dr Hongmei He 10
07 Security of Machine Tool Systems Dr Hongmei He 10
08 Cyber Thinking and Practice in Manufacturing Mr Jeremy Hilton (CDS)
Ms Lorraine Dodd (CDS)
10
09 Group Project (09-PT: Dissertation) Supervisors in
Academic/industry
40
10 Individual Project Supervisors in
Academic/Industry
80
11
Demands of Job Markets
 Big Data: “By 2018, the United States alone could face a shortage of 140,000 to 190,000 people
with deep analytical skills as well as 1.5 million managers and analysts with the know-how to
use the analysis of big data to make effective decisions” (2016 DataJobs.com ).
 The Internet of Things market size is estimated to grow from USD 157.05 Billion in 2016 to
USD 661.74 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 33.3% from 2016
to 2021. (www.marketsandmarkets.com, Apr 2016)
 The Cyber Security market size is estimated to grow from USD 122.45 Billion in 2016 to USD
202.36 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 10.6% during the
forecast period. (www.marketsandmarkets.com July 2016).
 Cloud Computing: Morgan Stanley predicts Microsoft cloud products will be 30% of revenue by
2018. In 2015, Amazon Web Services (AWS) generated $7.88B in revenue with Q4 2015, up
69% over last year. Worldwide spending on public cloud services will grow at a 19.4%
compound annual growth rate (CAGR) from nearly $70B in 2015 to more than $141B in 2019.
(www.forbes.com, Mar 2016)
12
Are You Ready?
Course Director: Dr Hongmei (Mary) He
Email: h.he@cranfield.ac.uk
Tel: +44 (0) 1234 75 8206
www.cranfield.ac.ukCSM

More Related Content

What's hot

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...Stuart Bennett
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformDeep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformAngela - Maria Despotopoulou
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...IJNSA Journal
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)MiajackB
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...Amélie Gyrard
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 

What's hot (16)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformDeep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 

Viewers also liked

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Historia cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luegoHistoria cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luegoPandora Garcia
 
3Com ISDN PRO TA
3Com ISDN PRO TA3Com ISDN PRO TA
3Com ISDN PRO TAsavomir
 
3Com 150A0055-03
3Com 150A0055-033Com 150A0055-03
3Com 150A0055-03savomir
 
Estrategias de Negociación Parte 2 Las personas en la negociación
Estrategias de Negociación Parte 2   Las personas en la negociaciónEstrategias de Negociación Parte 2   Las personas en la negociación
Estrategias de Negociación Parte 2 Las personas en la negociaciónAlberto Gómez Torres
 
Presentación de servicios gl nuevo
Presentación de servicios gl nuevoPresentación de servicios gl nuevo
Presentación de servicios gl nuevowillson lemus
 
M·system vos2t-r (ing)
  M·system vos2t-r (ing)  M·system vos2t-r (ing)
M·system vos2t-r (ing)biotech666
 
It to cut it and process costs
It to cut it and process costsIt to cut it and process costs
It to cut it and process costsSTAdcon
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1zahrasm
 

Viewers also liked (12)

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
The flood final
The flood finalThe flood final
The flood final
 
Historia cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luegoHistoria cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luego
 
3Com ISDN PRO TA
3Com ISDN PRO TA3Com ISDN PRO TA
3Com ISDN PRO TA
 
3Com 150A0055-03
3Com 150A0055-033Com 150A0055-03
3Com 150A0055-03
 
Estrategias de Negociación Parte 2 Las personas en la negociación
Estrategias de Negociación Parte 2   Las personas en la negociaciónEstrategias de Negociación Parte 2   Las personas en la negociación
Estrategias de Negociación Parte 2 Las personas en la negociación
 
Presentación de servicios gl nuevo
Presentación de servicios gl nuevoPresentación de servicios gl nuevo
Presentación de servicios gl nuevo
 
M·system vos2t-r (ing)
  M·system vos2t-r (ing)  M·system vos2t-r (ing)
M·system vos2t-r (ing)
 
It to cut it and process costs
It to cut it and process costsIt to cut it and process costs
It to cut it and process costs
 
S4 tarea4 flcaa
S4 tarea4 flcaaS4 tarea4 flcaa
S4 tarea4 flcaa
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
 

Similar to MSc cyber-secure manufacturing

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide setsBob Marcus
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
Japan 20200724 v13
Japan 20200724 v13Japan 20200724 v13
Japan 20200724 v13ISSIP
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market studySari Ojala
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market studyBusiness Finland
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoKnud Lasse Lueth
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoIoTAnalytics
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?MarketingArrowECS_CZ
 

Similar to MSc cyber-secure manufacturing (20)

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide sets
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Japan 20200724 v13
Japan 20200724 v13Japan 20200724 v13
Japan 20200724 v13
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 

MSc cyber-secure manufacturing

  • 1. 1 www.cranfield.ac.uk New MSc Course in Cyber- Secure Manufacturing www.cranfield.ac.uk/csm Hongmei He h.he@cranfield.ac.uk 08 Nov. 2016
  • 2. 2 Outline 1. Motivation 2. Aim and Objectives of the MSc Course 3. Course Vision and Structure 4. Modules and Course Team 5. Demands of job markets
  • 3. 3 A blast furnace at a German steel mill suffered "massive damage" following a cyber attack on the plant's network Motivation
  • 4. 4 Motivation FY 2014 Incidents Reported by Sectors (245 total)
  • 5. 5 Security Challenges in IoT Enabled Manufacturing Motivation  Big Data and Data Protection IBM estimated that the number of connected devices will increase to 40 billion by 2020. A huge number of connected devices (including sensors) will produce huge amount of data. (1) Data driven cyber security (2) Critical parameter protection in industry systems (3) Secure data transmission  Security of Cyber-Physical Systems (1) Mobile security for mobile accessing to industry systems (2) Process protection and IoT security (3) Protect legitimate ICS from cyber-attacks when they are connected to the Internet, as they are often developed for reliability and performance, not security, which leaves the systems to predetermined adversaries.
  • 6. 6 Aims and Objectives (UK/EU Only)  The aim -- to develop the next generation of manufacturing engineers who are able to protect manufacturing systems, machines and data against cyber threats.  Objectives -- to enable students to use cutting-edge technologies in IoT, Big Data, Cloud Computing and Cybersecurity to 1) identify cyber threats in manufacturing systems from the Internet 2) protect manufacturing systems from cyber attacks 3) improve incident response and disaster recovery in manufacturing systems. 4) assess the cost of cybersecurity solutions for manufacturing systems
  • 7. 7 The Vision of the Course Concept
  • 8. 8 Course Structure May - SeptOct.– Jan. Group Project Taught Modules Individual Thesis Project Feb. – Apr. Credits:  40% Taught modules  20% Group project  40% Thesis project
  • 9. 9 Short Courses Derived from the MSc Course Associated to the MSc course (5 days)  Secure IoT and System Architecture  Data Mining Techniques for Cyber-Threat Identification  Secure Cloud Manufacturing  Security of Machine Tool Systems Compressed short courses (3 days):  Big Data Analytics for Enterprises  IoT Security for Industry
  • 10. 10 Modules and Course Team Course Director: Dr Hongmei He ID Module Name Module Leader Credits 00 Induction Dr Konstantinos Salonitis 0 01 Modern Manufacturing and Security Challenges Prof Tetsuo Tomiyama 10 02 Operations Management A Professor/Reader 10 03 Secure IoT and System Architectures Dr Jörn Mehnen 10 04 Secure Cloud Manufacturing Dr Yifan Zhao and Dr Christopher Turner 10 05 Enterprise System Engineering Dr Konstantinos Salonitis 10 06 Data Mining Technology for Cyber Threat Identification Dr Hongmei He 10 07 Security of Machine Tool Systems Dr Hongmei He 10 08 Cyber Thinking and Practice in Manufacturing Mr Jeremy Hilton (CDS) Ms Lorraine Dodd (CDS) 10 09 Group Project (09-PT: Dissertation) Supervisors in Academic/industry 40 10 Individual Project Supervisors in Academic/Industry 80
  • 11. 11 Demands of Job Markets  Big Data: “By 2018, the United States alone could face a shortage of 140,000 to 190,000 people with deep analytical skills as well as 1.5 million managers and analysts with the know-how to use the analysis of big data to make effective decisions” (2016 DataJobs.com ).  The Internet of Things market size is estimated to grow from USD 157.05 Billion in 2016 to USD 661.74 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 33.3% from 2016 to 2021. (www.marketsandmarkets.com, Apr 2016)  The Cyber Security market size is estimated to grow from USD 122.45 Billion in 2016 to USD 202.36 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 10.6% during the forecast period. (www.marketsandmarkets.com July 2016).  Cloud Computing: Morgan Stanley predicts Microsoft cloud products will be 30% of revenue by 2018. In 2015, Amazon Web Services (AWS) generated $7.88B in revenue with Q4 2015, up 69% over last year. Worldwide spending on public cloud services will grow at a 19.4% compound annual growth rate (CAGR) from nearly $70B in 2015 to more than $141B in 2019. (www.forbes.com, Mar 2016)
  • 12. 12 Are You Ready? Course Director: Dr Hongmei (Mary) He Email: h.he@cranfield.ac.uk Tel: +44 (0) 1234 75 8206 www.cranfield.ac.ukCSM