Skip to main content
Till KTH:s startsida Till KTH:s startsida

FMF3032 Cyber-physical systems' safety and security 7.5 credits

Course offerings are missing for current or upcoming semesters.
Headings with content from the Course syllabus FMF3032 (Autumn 2020–) are denoted with an asterisk ( )

Content and learning outcomes

Course disposition

Part 0 - Course overview, introduction to the problem area, course objectives, first opportunity for the group to meet.

Part I - The operational perspective - Which of the characteristics of our society and human nature make personal and cyber security complex, i.e. not always straightforward to ensure?

Part II - The System Perspective - How do engineers attack system properties of personal and cyber security given the infrastructure of society to deal with this?

Part III - Software Perspective - How can we specify and verify system and software properties?

Part IV - Review / presentation / final discussion.

For each part: Tutorials and checklists, introductory lecture and recapitulation, seminars, assignments

Course contents

Safety and security are increasingly important for the design of complex technological systems, as they are becoming more intelligent, always connected and influencing the societal infrastructure at all levels. There is a need for both citizens and professionals to have a broad awareness of safety, security and their relationship. 

Citizens and experts shall be able to discuss the implications of safety and cybersecurity at different levels of society and industry; relate to best practice during the development of trustworthy cyber-physical systems (CPS) and the socio-technical systems they are used in; identify and define properties related to safety and cybersecurity in industrial and research projects; and use and adapt different tools and methodologies for analysing and verifying such properties as relevant for different industrial domains.

Therefore, the course consists of:

  • A summary of the evolution of the associated concepts.
  • Concepts and standards relevant to safety and cybersecurity at a societal level.
  • Concepts, standards, tools, and methodologies for best practice engineering at a system design level.
  • Concepts, standards, tools, and methodologies for best practice engineering at a software design level

Intended learning outcomes

After passing the course, the student should be able to:

  • Derive, explain, and evaluate safety and security aspects of CPS, and their relationships, according to best practice.
  • Construct models of risks, hazards, threats, and CPS.
  • Derive and specify safety and security properties to eliminate, reduce or deal with risks.
  • Apply analysis methods and tools to models of CPS.
  • Explain and compare different approaches to verifying and validating safety and security.

Literature and preparations

Specific prerequisites

Admitted to PhD studies

Recommended prerequisites

No information inserted

Equipment

Computer or access to KTH's computer rooms

Literature

  • E. Griffor et al.: Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Elsevier, 2016 (electronic copy available via KTH library).
  •  J. Rasmussen, I. Svedung: Proactive Risk Management in a Dynamic Society. Swedish Rescue Services Agency, 2000.

Other course literature is provided on Canvas

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

P, F

Examination

  • INL1 - Assignment, 3.0 credits, grading scale: P, F
  • ÖVN1 - Exercises, 4.5 credits, grading scale: P, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

The examination is based on individual partial exam, group assignment and group presentation.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

This course does not belong to any Main field of study.

Education cycle

Third cycle

Add-on studies

No information inserted

Postgraduate course

Postgraduate courses at ITM/Machine Design