Intendierte Lernergebnisse
Security management is a core duty of contemporary business continuity management. As such, it is vital for people to know best practices, to understand the diversity of challenges in industrial security, and to carry out processes for security maintenance.The course is divided into two logical units. In the first part aspects of risk management are considered. In the second part the implementation of security concepts in industrial plants based on IEC 62443 is considered.After finishing the risk management part of the course, students shouldunderstand the basic concepts of risk managementname the core steps of the risk management processidentify and apply methods to determine hazards and threatsidentify and apply methods to assess impacts and likelihoodsidentify and apply methods to evaluate risksunderstand current research questions from the field of risk managementThe second part focusing on security concepts targets the following learning outcomes:Gain an overview of current security standardsKnowledge about the development of standardsUnderstanding the advantages of using standards over individual solutionsKnow the structure and scope of IEC 62443 in the current versionKnow the elements of the IEC 62443 family of standardsBe able to demonstrate an exemplary use of parts of IEC 62443 on the basis of a practical example
Inhalt/e
Basic terminology of risk managementInterrelations between risk and security managementOverview on different risk management frameworksCore steps of the risk management processMethodologies to be used in risk managementReal-life examples for risk managementCurrent research questionsIntroduction to the topic of norms and standardsOverview of the development of a standard and the institutions involvedOverview of standards in the security environmentIntroduction to the IEC 62443 family of standardsInsight into structure and elements of IEC 62443Implementation of the requirements of IEC 62443 in real-life examples
Erwartete Vorkenntnisse
Basic understanding of System Security (lecture)
Literatur
Will be provided in the course