Information for research students about course offerings
Course starts 21st of September 2022, and ends on 16th of November
Choose semester and course offering
Choose semester and course offering to see information from the correct course syllabus and course offering.
Content and learning outcomes
Safety and security are increasingly important for the design of complex technological systems, as they are becoming more intelligent, always connected and influencing the societal infrastructure at all levels. There is a need for both citizens and professionals to have a broad awareness of safety, security and their relationship.
Citizens and experts shall be able to discuss the implications of safety and cybersecurity at different levels of society and industry; relate to best practice during the development of trustworthy cyber-physical systems (CPS) and the socio-technical systems they are used in; identify and define properties related to safety and cybersecurity in industrial and research projects; and use and adapt different tools and methodologies for analysing and verifying such properties as relevant for different industrial domains.
Therefore, the course consists of:
- A summary of the evolution of the associated concepts.
- Concepts and standards relevant to safety and cybersecurity at a societal level.
- Concepts, standards, tools, and methodologies for best practice engineering at a system design level.
- Concepts, standards, tools, and methodologies for best practice engineering at a software design level
Intended learning outcomes
After passing the course, the student should be able to:
- Derive, explain, and evaluate safety and security aspects of CPS, and their relationships, according to best practice.
- Construct models of risks, hazards, threats, and CPS.
- Derive and specify safety and security properties to eliminate, reduce or deal with risks.
- Apply analysis methods and tools to models of CPS.
- Explain and compare different approaches to verifying and validating safety and security.
Part 0 - Course overview, introduction to the problem area, course objectives, first opportunity for the group to meet.
Part I - The operational perspective - Which of the characteristics of our society and human nature make personal and cyber security complex, i.e. not always straightforward to ensure?
Part II - The System Perspective - How do engineers attack system properties of personal and cyber security given the infrastructure of society to deal with this?
Part III - Software Perspective - How can we specify and verify system and software properties?
Part IV - Review / presentation / final discussion.
For each part: Tutorials and checklists, introductory lecture and recapitulation, seminars, assignments
Literature and preparations
Admitted to PhD studies
Computer or access to KTH's computer rooms
- E. Griffor et al.: Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Elsevier, 2016 (electronic copy available via KTH library).
- J. Rasmussen, I. Svedung: Proactive Risk Management in a Dynamic Society. Swedish Rescue Services Agency, 2000.
Other course literature is provided on Canvas
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
- INL1 - Assignment, 3.0 credits, grading scale: P, F
- ÖVN1 - Exercises, 4.5 credits, grading scale: P, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
The examination is based on individual partial exam, group assignment and group presentation.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.Course web FMF3032