Course overview
In this course, students will design, analyse and implement effective security for telecommunication devices and systems. Content includes: Overview of frameworks for threat assessment (e.g., MITRE ATT and CK and MITRE ATLAS) and threat mitigation (e.g., NIST Cybersecurity Framework, MITRE D3FEND, Lockheed Martin's Cyber Kill Chain, Systems Security Engineering Framework, ISO/IEC/IEEE 15288); Device security at the hardware level: hardware-enabled security and platform trust, common vulnerabilities (top CWEs), common attacks (e.g., hardware trojan, side-channel analysis), common defences (e.g., physical unclonable function, trusted computing technologies including Trusted Platform Module and Trusted Execution Environment); Device security at the software level: common vulnerabilities (top CWEs, OWASP top 10), common attacks (cyber threat trends), common defences (e.g., safe programming languages, application security testing, verified microkernels), novel attacks and emerging defences (e.g., adversarial machine learning); Network security at the physical layer (electronic warfare and physical-layer security), data link layer (reactive jamming, cognitive anti-jamming), network layer (L3 distributed denial of service, attacks on routing and countermeasures), and upper layers (L4 and L4 distributed denial of service, protocol verification using formal methods, cryptographic protocols); Specific focus on two security measures: (i) quantum key distribution, (ii) threat detection using security information and event management (SIEM) and machine learning; Examples drawn from the latest developments in space networks, including Solar System Internetwork as well as other CCSDS-defined architectures and protocols.
Course learning outcomes
- Explain systems security engineering concepts, and among these concepts, apply threat and vulnerability assessment to telecommunication devices and systems.
- Identify and analyse attack vectors relevant to an attack surface, and accordingly, design a security plan.
- Explain the principles of some common attacks and corresponding defences.
- Identify and analyse the impact of an attack, and based on the analysis, design a countermeasure.
- Against an attack, implement and evaluate a countermeasure.
- Apply research methodology to analyse and discuss a contemporary topic on telecommunications and device security.