SlideShare a Scribd company logo
1
www.cranfield.ac.uk
New MSc Course in Cyber-
Secure Manufacturing
www.cranfield.ac.uk/csm
Hongmei He
h.he@cranfield.ac.uk
08 Nov. 2016
2
Outline
1. Motivation
2. Aim and Objectives of the MSc Course
3. Course Vision and Structure
4. Modules and Course Team
5. Demands of job markets
3
A blast furnace at a German steel mill suffered "massive damage" following a cyber
attack on the plant's network
Motivation
4
Motivation
FY 2014 Incidents Reported by Sectors (245 total)
5
Security Challenges in IoT Enabled Manufacturing
Motivation
 Big Data and Data Protection
IBM estimated that the number of connected devices will increase to 40 billion by 2020. A
huge number of connected devices (including sensors) will produce huge amount of data.
(1) Data driven cyber security
(2) Critical parameter protection in industry systems
(3) Secure data transmission
 Security of Cyber-Physical Systems
(1) Mobile security for mobile accessing to industry systems
(2) Process protection and IoT security
(3) Protect legitimate ICS from cyber-attacks when they are connected to the Internet, as
they are often developed for reliability and performance, not security, which leaves
the systems to predetermined adversaries.
6
Aims and Objectives (UK/EU Only)
 The aim -- to develop the next generation of manufacturing engineers who are able to protect
manufacturing systems, machines and data against cyber threats.
 Objectives -- to enable students to use cutting-edge technologies in IoT, Big Data, Cloud
Computing and Cybersecurity to
1) identify cyber threats in manufacturing systems from the Internet
2) protect manufacturing systems from cyber attacks
3) improve incident response and disaster recovery in manufacturing systems.
4) assess the cost of cybersecurity solutions for manufacturing systems
7
The Vision of the Course Concept
8
Course Structure
May - SeptOct.– Jan.
Group Project
Taught Modules Individual Thesis Project
Feb. – Apr.
Credits:
 40% Taught modules
 20% Group project
 40% Thesis project
9
Short Courses Derived from the MSc Course
Associated to the MSc course (5 days)
 Secure IoT and System Architecture
 Data Mining Techniques for Cyber-Threat
Identification
 Secure Cloud Manufacturing
 Security of Machine Tool Systems
Compressed short courses (3 days):
 Big Data Analytics for Enterprises
 IoT Security for Industry
10
Modules and Course Team
Course Director: Dr Hongmei He
ID Module Name Module Leader Credits
00 Induction Dr Konstantinos Salonitis 0
01 Modern Manufacturing and Security Challenges Prof Tetsuo Tomiyama 10
02 Operations Management A Professor/Reader 10
03 Secure IoT and System Architectures Dr Jörn Mehnen 10
04 Secure Cloud Manufacturing Dr Yifan Zhao and
Dr Christopher Turner
10
05 Enterprise System Engineering Dr Konstantinos Salonitis 10
06 Data Mining Technology for Cyber Threat Identification Dr Hongmei He 10
07 Security of Machine Tool Systems Dr Hongmei He 10
08 Cyber Thinking and Practice in Manufacturing Mr Jeremy Hilton (CDS)
Ms Lorraine Dodd (CDS)
10
09 Group Project (09-PT: Dissertation) Supervisors in
Academic/industry
40
10 Individual Project Supervisors in
Academic/Industry
80
11
Demands of Job Markets
 Big Data: “By 2018, the United States alone could face a shortage of 140,000 to 190,000 people
with deep analytical skills as well as 1.5 million managers and analysts with the know-how to
use the analysis of big data to make effective decisions” (2016 DataJobs.com ).
 The Internet of Things market size is estimated to grow from USD 157.05 Billion in 2016 to
USD 661.74 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 33.3% from 2016
to 2021. (www.marketsandmarkets.com, Apr 2016)
 The Cyber Security market size is estimated to grow from USD 122.45 Billion in 2016 to USD
202.36 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 10.6% during the
forecast period. (www.marketsandmarkets.com July 2016).
 Cloud Computing: Morgan Stanley predicts Microsoft cloud products will be 30% of revenue by
2018. In 2015, Amazon Web Services (AWS) generated $7.88B in revenue with Q4 2015, up
69% over last year. Worldwide spending on public cloud services will grow at a 19.4%
compound annual growth rate (CAGR) from nearly $70B in 2015 to more than $141B in 2019.
(www.forbes.com, Mar 2016)
12
Are You Ready?
Course Director: Dr Hongmei (Mary) He
Email: h.he@cranfield.ac.uk
Tel: +44 (0) 1234 75 8206
www.cranfield.ac.ukCSM

More Related Content

What's hot

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
Stuart Bennett
 
Ijisa
IjisaIjisa
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformDeep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Angela - Maria Despotopoulou
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
IJNSA Journal
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
Amélie Gyrard
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 

What's hot (16)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformDeep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 

Viewers also liked

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
CentraComm
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
The flood final
The flood finalThe flood final
The flood final
mikewills101
 
Historia cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luegoHistoria cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luego
Pandora Garcia
 
3Com ISDN PRO TA
3Com ISDN PRO TA3Com ISDN PRO TA
3Com ISDN PRO TA
savomir
 
3Com 150A0055-03
3Com 150A0055-033Com 150A0055-03
3Com 150A0055-03
savomir
 
Estrategias de Negociación Parte 2 Las personas en la negociación
Estrategias de Negociación Parte 2   Las personas en la negociaciónEstrategias de Negociación Parte 2   Las personas en la negociación
Estrategias de Negociación Parte 2 Las personas en la negociación
Alberto Gómez Torres
 
Presentación de servicios gl nuevo
Presentación de servicios gl nuevoPresentación de servicios gl nuevo
Presentación de servicios gl nuevo
willson lemus
 
M·system vos2t-r (ing)
  M·system vos2t-r (ing)  M·system vos2t-r (ing)
M·system vos2t-r (ing)
biotech666
 
It to cut it and process costs
It to cut it and process costsIt to cut it and process costs
It to cut it and process costs
STAdcon
 
S4 tarea4 flcaa
S4 tarea4 flcaaS4 tarea4 flcaa
S4 tarea4 flcaa
Alfredo Flores Cardenas
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
zahrasm
 

Viewers also liked (12)

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
The flood final
The flood finalThe flood final
The flood final
 
Historia cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luegoHistoria cosmética- maquillaje ahora y luego
Historia cosmética- maquillaje ahora y luego
 
3Com ISDN PRO TA
3Com ISDN PRO TA3Com ISDN PRO TA
3Com ISDN PRO TA
 
3Com 150A0055-03
3Com 150A0055-033Com 150A0055-03
3Com 150A0055-03
 
Estrategias de Negociación Parte 2 Las personas en la negociación
Estrategias de Negociación Parte 2   Las personas en la negociaciónEstrategias de Negociación Parte 2   Las personas en la negociación
Estrategias de Negociación Parte 2 Las personas en la negociación
 
Presentación de servicios gl nuevo
Presentación de servicios gl nuevoPresentación de servicios gl nuevo
Presentación de servicios gl nuevo
 
M·system vos2t-r (ing)
  M·system vos2t-r (ing)  M·system vos2t-r (ing)
M·system vos2t-r (ing)
 
It to cut it and process costs
It to cut it and process costsIt to cut it and process costs
It to cut it and process costs
 
S4 tarea4 flcaa
S4 tarea4 flcaaS4 tarea4 flcaa
S4 tarea4 flcaa
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
 

Similar to MSc cyber-secure manufacturing

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Bill Chamberlin
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
Exosite
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide sets
Bob Marcus
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
Dr David Probert
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
voversbyobersby
 
Japan 20200724 v13
Japan 20200724 v13Japan 20200724 v13
Japan 20200724 v13
ISSIP
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
Pooja G N
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
Feisal Nanji
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
Sari Ojala
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
Business Finland
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
IoTAnalytics
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Knud Lasse Lueth
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
MarketingArrowECS_CZ
 

Similar to MSc cyber-secure manufacturing (20)

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide sets
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Japan 20200724 v13
Japan 20200724 v13Japan 20200724 v13
Japan 20200724 v13
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

MSc cyber-secure manufacturing

  • 1. 1 www.cranfield.ac.uk New MSc Course in Cyber- Secure Manufacturing www.cranfield.ac.uk/csm Hongmei He h.he@cranfield.ac.uk 08 Nov. 2016
  • 2. 2 Outline 1. Motivation 2. Aim and Objectives of the MSc Course 3. Course Vision and Structure 4. Modules and Course Team 5. Demands of job markets
  • 3. 3 A blast furnace at a German steel mill suffered "massive damage" following a cyber attack on the plant's network Motivation
  • 4. 4 Motivation FY 2014 Incidents Reported by Sectors (245 total)
  • 5. 5 Security Challenges in IoT Enabled Manufacturing Motivation  Big Data and Data Protection IBM estimated that the number of connected devices will increase to 40 billion by 2020. A huge number of connected devices (including sensors) will produce huge amount of data. (1) Data driven cyber security (2) Critical parameter protection in industry systems (3) Secure data transmission  Security of Cyber-Physical Systems (1) Mobile security for mobile accessing to industry systems (2) Process protection and IoT security (3) Protect legitimate ICS from cyber-attacks when they are connected to the Internet, as they are often developed for reliability and performance, not security, which leaves the systems to predetermined adversaries.
  • 6. 6 Aims and Objectives (UK/EU Only)  The aim -- to develop the next generation of manufacturing engineers who are able to protect manufacturing systems, machines and data against cyber threats.  Objectives -- to enable students to use cutting-edge technologies in IoT, Big Data, Cloud Computing and Cybersecurity to 1) identify cyber threats in manufacturing systems from the Internet 2) protect manufacturing systems from cyber attacks 3) improve incident response and disaster recovery in manufacturing systems. 4) assess the cost of cybersecurity solutions for manufacturing systems
  • 7. 7 The Vision of the Course Concept
  • 8. 8 Course Structure May - SeptOct.– Jan. Group Project Taught Modules Individual Thesis Project Feb. – Apr. Credits:  40% Taught modules  20% Group project  40% Thesis project
  • 9. 9 Short Courses Derived from the MSc Course Associated to the MSc course (5 days)  Secure IoT and System Architecture  Data Mining Techniques for Cyber-Threat Identification  Secure Cloud Manufacturing  Security of Machine Tool Systems Compressed short courses (3 days):  Big Data Analytics for Enterprises  IoT Security for Industry
  • 10. 10 Modules and Course Team Course Director: Dr Hongmei He ID Module Name Module Leader Credits 00 Induction Dr Konstantinos Salonitis 0 01 Modern Manufacturing and Security Challenges Prof Tetsuo Tomiyama 10 02 Operations Management A Professor/Reader 10 03 Secure IoT and System Architectures Dr Jörn Mehnen 10 04 Secure Cloud Manufacturing Dr Yifan Zhao and Dr Christopher Turner 10 05 Enterprise System Engineering Dr Konstantinos Salonitis 10 06 Data Mining Technology for Cyber Threat Identification Dr Hongmei He 10 07 Security of Machine Tool Systems Dr Hongmei He 10 08 Cyber Thinking and Practice in Manufacturing Mr Jeremy Hilton (CDS) Ms Lorraine Dodd (CDS) 10 09 Group Project (09-PT: Dissertation) Supervisors in Academic/industry 40 10 Individual Project Supervisors in Academic/Industry 80
  • 11. 11 Demands of Job Markets  Big Data: “By 2018, the United States alone could face a shortage of 140,000 to 190,000 people with deep analytical skills as well as 1.5 million managers and analysts with the know-how to use the analysis of big data to make effective decisions” (2016 DataJobs.com ).  The Internet of Things market size is estimated to grow from USD 157.05 Billion in 2016 to USD 661.74 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 33.3% from 2016 to 2021. (www.marketsandmarkets.com, Apr 2016)  The Cyber Security market size is estimated to grow from USD 122.45 Billion in 2016 to USD 202.36 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 10.6% during the forecast period. (www.marketsandmarkets.com July 2016).  Cloud Computing: Morgan Stanley predicts Microsoft cloud products will be 30% of revenue by 2018. In 2015, Amazon Web Services (AWS) generated $7.88B in revenue with Q4 2015, up 69% over last year. Worldwide spending on public cloud services will grow at a 19.4% compound annual growth rate (CAGR) from nearly $70B in 2015 to more than $141B in 2019. (www.forbes.com, Mar 2016)
  • 12. 12 Are You Ready? Course Director: Dr Hongmei (Mary) He Email: h.he@cranfield.ac.uk Tel: +44 (0) 1234 75 8206 www.cranfield.ac.ukCSM