Module Database Search



MODULE DESCRIPTOR
Module Title
OT and ICS Security
Reference CM4122 Version 2
Created June 2022 SCQF Level SCQF 10
Approved May 2020 SCQF Points 15
Amended July 2022 ECTS Points 7.5

Aims of Module
To provide students with the ability to identify cyber security threats and implement countermeasures within Operation Technology (OT) Networks and Industrial Control Systems (ICS).

Learning Outcomes for Module
On completion of this module, students are expected to be able to:
1 Identify and explain OT and ICS protocol vulnerabilities and evaluate the security of an industrial network infrastructure.
2 Design and implement countermeasures to protect an OT network and ICS from unauthorised access.
3 Understand the ethical, legal and operational policies of OT and ICS security testing.
4 Critically evaluate security controls used to protect OT and ICS networked systems.
5 Effectively communicate the results of OT and ICS auditing, assessing and security testing to demonstrate regulatory compliance.

Indicative Module Content
The ethical and legal issues relating to penetration testing OT and ICS. Network enumeration and network mapping. Use of network sniffers. OT and ICS device management and exploitation. Maintaining physical security of network devices. IoE security and wireless attacks. Best Practice Guides: ISO 27001, ISO 27005, ISO 27014, Cyber Assessment Framework, ISA99 and IEC 62443 (Series 2).

Module Delivery
This module is taught using a structured programme of lectures, lab sessions and student centred learning.

Indicative Student Workload Full Time Part Time
Contact Hours 30 N/A
Non-Contact Hours 120 N/A
Placement/Work-Based Learning Experience [Notional] Hours N/A N/A
TOTAL 150 N/A
Actual Placement hours for professional, statutory or regulatory body    

ASSESSMENT PLAN
If a major/minor model is used and box is ticked, % weightings below are indicative only.
Component 1
Type: Coursework Weighting: 100% Outcomes Assessed: 1, 2, 3, 4, 5
Description: An individual coursework assessment.

MODULE PERFORMANCE DESCRIPTOR
Explanatory Text
The calculation of the overall grade for this module is based on 100% weighing of C1. An overall minimum grade D is required to pass the module.
Module Grade Minimum Requirements to achieve Module Grade:
A The student needs to achieve an A in C1.
B The student needs to achieve a B in C1.
C The student needs to achieve a C in C1.
D The student needs to achieve a D in C1.
E The student needs to achieve an E in C1.
F The student needs to achieve an F in C1.
NS Non-submission of work by published deadline or non-attendance for examination

Module Requirements
Prerequisites for Module None.
Corequisites for module None.
Precluded Modules None.

INDICATIVE BIBLIOGRAPHY
1 McNAB,C., 2016. Network Security Assessment. 3rd Ed. O'Reilly.
2 KIM, P., 2015. The Hacker Playbook 2: Practical Guide to Penetration Testing. CreateSpace Independent Publishing Platform.
3 WEIDMAN, G., 2014. Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press
4 RADVANOVSKY, R. and BODSKY, J., 2016. Handbook of SCADA/Control Systems Security. 2nd Ed. CRC Press
5 HASSANIEN, A.E. and ELHOSENY, M., 2019. Cyber Security and Secure Information Systems: Challenges and Solutions in Smart Environments. ISBN: 978-3030168360


Robert Gordon University, Garthdee House, Aberdeen, AB10 7QB, Scotland, UK: a Scottish charity, registration No. SC013781