GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR

COURSE DESCRIPTION
CYBER SECURITY IN SMART GRIDS/5031339
Course Title: CYBER SECURITY IN SMART GRIDS
Credits 3 ECTS 7.5
Course Semester 2 Type of The Course Elective
COURSE INFORMATION
 -- (CATALOG CONTENT)
 -- (TEXTBOOK)
 -- (SUPPLEMENTARY TEXTBOOK)
 -- (PREREQUISITES AND CO-REQUISITES)
 -- LANGUAGE OF INSTRUCTION
  Turkish
 -- COURSE OBJECTIVES
 -- COURSE LEARNING OUTCOMES
Recognize smart grids, define the basic components and communication architectures in these networks.
Know what malicious attacks that may threat network security in smart networks and what precautions can be taken against these attacks.
Know standards developed in this field.

 -- MODE OF DELIVERY
  The mode of delivery of this course is Face to face
 --WEEKLY SCHEDULE
1. Week  Definition of smart grids, basic components, need for smart grids
2. Week  Energy efficiency and smart grid’s contribution to energy efficiency, sample comparative applications
3. Week  Communication protocols for power systems, Communication network architecture in the Smart Grid
4. Week  Objectives and requirements of cyber security in the Smart Grid, Network security threats, Attack classification
5. Week  Network countermeasures for the Smart Grid, Attack detection for power networks, Applications of Attack Mitigation
6. Week  Security issues: Access control/data access control, Anti-virus, Application whitelisting/blacklisting, Database security, Encryption, Firewall, Intru
7. Week  Examining the current applications
8. Week  Midterm exam
9. Week  Monitoring the smart grids, design of monitoring systems, software products for monitoring
10. Week  International standards regarding smart grids, NISTIR 7628 Smart Grid cyber security architecture, EU M/490 and the SGCG reference architecture,
11. Week  IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagrams, ISA-62443 standard
12. Week  Development of a simplified Smart Grid reference model
13. Week  Sample project study
14. Week  Sample project study (cont.)
15. Week  Final exam
16. Week  
 -- TEACHING and LEARNING METHODS
 -- ASSESSMENT CRITERIA
 
Quantity
Total Weighting (%)
 Midterm Exams
1
30
 Assignment
5
10
 Application
3
10
 Projects
2
10
 Practice
0
0
 Quiz
3
10
 Percent of In-term Studies  
70
 Percentage of Final Exam to Total Score  
30
 -- WORKLOAD
 Activity  Total Number of Weeks  Duration (weekly hour)  Total Period Work Load
 Weekly Theoretical Course Hours
14
3
42
 Weekly Tutorial Hours
0
 Reading Tasks
8
3
24
 Searching in Internet and Library
10
3
30
 Material Design and Implementation
4
3
12
 Report Preparing
3
3
9
 Preparing a Presentation
3
4
12
 Presentation
1
4
4
 Midterm Exam and Preperation for Midterm Exam
4
2
8
 Final Exam and Preperation for Final Exam
4
4
16
 Other (should be emphasized)
6
5
30
 TOTAL WORKLOAD: 
187
 TOTAL WORKLOAD / 25: 
7.48
 Course Credit (ECTS): 
7.5
 -- COURSE'S CONTRIBUTION TO PROGRAM
NO
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
1Defines problems in information security engineering.X
2Grasps the theoretical knowledge about information security engineering.X
3Applies gained knowledge and develops new solutions in the field of information security engineering.X
4Follows the national and international literature on the scientific and technological developments in information security engineering.X
5Proposes solutions to information security engineering problems using scientific research methods in the light of quality and standards.X
6Knows and applies the methods necessary to collect and analyze data pertaining to information security engineering.X
7Grasps the interaction among various disciplines related to information security engineering.X
8Evaluates research results using scientific criteria, presents the results in the form of academic articles and reports.X
9Takes responsibility to solve new problems in information security engineering.X
10Performs all professional activities within the confines of the law and ethics.X
11Makes contributions to industry and society through scientific innovation, novel approaches or applications of known methods to new fields.X
12Improves information security awareness in society by sharing knowledge and experience.X
13Recognizes the necessity of lifelong learning and acts accordingly.X
 -- NAME OF LECTURER(S)
   (Assoc. Prof. Dr. Erdal IRMAK)
 -- WEB SITE(S) OF LECTURER(S)
   (http://websitem.gazi.edu.tr/erdal)
 -- EMAIL(S) OF LECTURER(S)
   (erdal@gazi.edu.tr)