Cyber-physical systems cannot be secured by technological means alone, they require a holistic security approach that addresses the people, process, physical and technological aspects of the system or system of systems. A key stage in the development of a sensitive or secure system is applying security engineering principles to the system architecture.
Secure cyber-physical systems have a singular goal - to concurrently enable things to happen that should happen, whilst preventing things from happening that should not happen. Within that simplicity are deep challenges: defining the contextually contingent sets of should and should not; anticipating what the future might bring; determining the extent of the system. Alongside these deep challenges however, there are well understood patterns of implementation that make the shoulds more likely and the should nots less likely. Similarly, there are well understood patterns that tend to encourage the opposite.
This module is concerned with deliberately choosing good architectural patterns of implementation for the long-term well-being of the system under consideration, coupled with the design of appropriate physical deployments and the use of secure operating procedures.