Educational guide
IDENTIFYING DATA 2023_24
Subject SECURITY OF CYBER-PHYSICAL SYSTEMS I Code 01733105
Study programme
Descriptors Credit. Type Year Period
6 Compulsory First
Language
Ingles
Prerequisites
Department
Coordinador
E-mail
Lecturers
Web http://agora.unileon.es
General description The goal of the course is to develop knowledge about the security problems related to cyber-physical systemas. In particular those related to autonomous systems (critical infraestructures and robots).
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Tribunal suplente
Cargo Departamento Profesor

Competencies
Type A Code Competences Specific
Type B Code Competences Transversal
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
A17063
B5220
C1
C2
A17063
B5223
B5224
C3
C5
A17063
B5221
B5222
C4
A17066
B5225
C1

Contents
Topic Sub-topic
Introduction to Cyber-physical Systems Introduction to Cyber-physical Systems
Related technologies 1.- Real-time systems (RTS).
2.- Modeling and planning of RTSs.
3.- Systems control: control theory.
4.- Communications and distributed systems.
5.- Other technologies.
Cybersecurity concepts in the different types of cyber-physical systems. 0.- Cyber-physical systems taxonomy.
1.- Robotics.
2.- Cyber-physical transport systems.
3.- Internet of things (IoT).
4.- Sensor networks (WSNs).
5.- Health systems.
6.- Public infrastructures.
7.- Industrial systems: PLCs, SCADA, etc.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Practicals using information and communication technologies (ICTs) in computer rooms 18 62 80
 
 
Lecture 25 40 65
 
Practical tests 3 0 3
Mixed tests 2 0 2
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Practicals using information and communication technologies (ICTs) in computer rooms Practical application of the theoretical concepts using ICTs.
Lecture Exposure by the teacher of theoretical, practical, and methodological concepts. The exhibitions may be accompanied by audio-visual material: slides, online video resources.

Personalized attention
 
Lecture
Description
Personalized attention can be carried out to clarify the theoretical, practical, and methodological concepts. They cannot be used to repeat concepts exposed in classes that the student has not attended.

Assessment
  Description Qualification
Lecture Summative assessment 25%
Practicals using information and communication technologies (ICTs) in computer rooms Continuous assessment 40%
Mixed tests Continuous assessment 10%
Practical tests Continuous assessment 25%
 
Other comments and second call
The works and practices presented may be reviewed with an anti-plagiarism computer program that can carry out checks between the works of the students of the current and previous call and against external sources. In the case of plagiarism, the work will be classified as suspended. During the evaluation tests, the use of electronic resources (calculators, tablets, telephones, computers, etc.) will not be possible, except for those tests that, upon the express indication of the teacher, require the use of any of these resources. In the event of any irregularity during the examination or corresponding evaluation test, the exam will be withdrawn immediately, the student will be expelled and the grade will be suspended. In any case, it will comply with the provisions of the internal regulations of the ULe included in the document "Guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests" (Approved Standing Committee of the Governing Council 29/01 / 2015).

The assessment of the practices will follow one of the following criteria (optionally both). The first will be an individual test that will consist of either a modification of the practice presented, or an exposition of it. The second will be the assessment of the own practice by the teacher.

In the second call, there will be an evaluation test of theoretical and practical content. Additionally, the delivery of one or more practices will be required for their subsequent evaluation in the same terms as in the first call (individual test and/or assessment of the practice).

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic

Securing Cyber-Physical SystemsHardcover–Al-Sakib Khan Pathan(Editor). CRC Press (October 6, 2015)

Complementary


Recommendations