CPS foundations
Definition, properties, application domains, history, architecture, components, autonomy, reliability, safety, security, modeling, control, data, digital twins, and data-driven methods.
00
These are the major blocks you should remember.
Definition, properties, application domains, history, architecture, components, autonomy, reliability, safety, security, modeling, control, data, digital twins, and data-driven methods.
Why traffic viewing is insufficient, goals of analysis, network architecture, IT vs OT, assets, channels, observation points, data sources, methods, tools, and common analytical mistakes.
What the physical environment includes, physical trust boundaries, zones, properties of a protected environment, data sources, threat models, analytical methods, and practical tools.
01
A cyber-physical system combines sensing, computation, networking, and physical action into one operational loop.
A cyber-physical system is a system where physical objects and processes are connected to computational elements through data networks. It does not only process information. It observes the real world, makes decisions, and changes real conditions.
Timing matters. A correct decision that arrives too late may be useless or dangerous.
The system constantly receives data about the effect of its actions and adjusts its behavior.
CPS combines discrete logic, software, and protocols with continuous physical processes such as movement, temperature, pressure, and current.
Many CPS can measure, decide, and control without constant human input, while adapting to noise, load changes, failures, and new operating conditions.
CPS must tolerate faults through diagnostics, redundancy, safe degradation, and failure detection because software errors can become physical hazards.
The system reacts to real operating conditions such as location, temperature, human presence, environmental changes, and mode of operation.
In critical applications, behavior should be analyzable, modelable, and testable before deployment.
A CPS may be a single device or a distributed infrastructure such as a plant, transport system, or energy network.
01A
The lectures repeatedly show that different industries share the same engineering pattern: sensing, computation, communication, control, and physical effect.
Machines, sensors, controllers, MES/SCADA, predictive maintenance, digital twins, adaptive quality control, and human-robot collaboration.
Cameras, lidars, radars, localization, planning, braking, steering, and strict timing requirements.
Connected medical devices, remote monitoring, clinical decision support, and cyber risk with direct therapeutic consequences.
HVAC, lighting, access control, energy optimization, and continuous feedback between sensing and building controls.
RFID, vision, AGV/AMR platforms, conveyors, routing logic, throughput constraints, and worker-safety implications.
Smart grids, DER, microgrids, robotic cells, collaborative robots, and distributed autonomous platforms.
01B
The lectures treat these as related but not identical ideas. Mixing them is a common mistake.
Embedded System
The key question is: what function does this device perform? It may be isolated and does not have to be networked.
IoT
The key question is: how does the device communicate, report, and integrate with a platform or service?
02
The distinction is basic, and exam questions often hinge on it.
Safety
Safety focuses on preventing dangerous physical outcomes, even when failures, mistakes, or unexpected conditions occur.
Security
Security focuses on protecting data, nodes, commands, and trust relationships from malicious interference.
In CPS these are linked: a digital attack can cause physical damage, and a physical intervention can compromise digital trust.
02A
The lectures repeatedly return to the same architecture: object, sensing, communication, computation, and actuation.
The real process being measured and influenced.
Collect state from the physical environment.
Transfers telemetry, commands, and coordination data.
Interpret data, compute actions, and manage operating modes.
Apply physical change in the world.
02B
Lecture 1 expands far beyond basic definitions. These concepts are central if you need to explain CPS as an engineering discipline rather than a buzzword.
Data
CPS data includes measurements, events, configuration changes, and incident traces. Quality depends on timing, semantics, and traceability, not only volume.
Digital Twin
A digital twin is more than a model. It is a practical digital representation connected to the system and useful across the life cycle.
AI Limits
Data-driven methods help with anomaly detection and complex patterns, but they do not replace physical understanding, verification, or engineering discipline.
03
Network analysis is not just packet watching. It is structured investigation of how the system communicates and whether those communications support safe control.
Analysis needs a specific object: a segment, a control loop, or a group of nodes. Traffic without context is only raw data.
You must know which nodes are expected, which protocols are allowed, who may initiate connections, and when traffic is normal.
Not every anomaly is an attack, but most attacks appear as deviations from the expected network profile.
Traffic traces help reveal what happened, which nodes were involved, and how the event may have affected control.
The goal is architectural understanding: identify unnecessary connections, weak segmentation, critical dependencies, and excessive attack surface.
03A
Lecture 2 treats the network as a layered operational environment, not a flat cable diagram.
Sensors and actuators near the process. Traffic is often short, cyclical, and highly deterministic.
PLC, RTU, and local controllers. This segment is critical because it directly shapes process behavior.
Monitoring, operator interaction, visualization, and engineering workflows.
Historians, databases, logging, application services, and integration functions.
Remote services, platform integrations, vendor support, and wider attack surface.
Different priorities, lifecycles, timing assumptions, and risk models, but increasingly connected.
03B
The lectures emphasize that what you can conclude depends on where you observe from.
03C
Lecture 2 spends a lot of time on methodology, not just tool names.
Best for detail and investigation, expensive for scale.
Best for communication structure and baselining.
Useful for known threats and suspicious interactions.
Correlation and behavior analysis across broader telemetry.
Looking for threats without knowing the system design.
Misclassifying legitimate operations or missing real risk.
04
In CPS, physical security is broader than doors and guards. The material environment is part of observability, controllability, and trust.
Operability
Equipment, power, connectivity, and local infrastructure must be physically available and stable.
Observability
Access events, cabinet opening, service actions, and conditions in the field need monitoring and documentation.
Controllability
Commands only matter if actuators, sensors, power, cabling, and local modes preserve the intended control path.
04A
Lecture 3 does not stop at listing objects. It models physical space as a multi-zone architecture with unequal access meaning.
First barrier, but never sufficient by itself.
Approach paths, outdoor equipment, and distributed assets.
General physical presence does not equal critical access.
Rooms where access starts to imply direct system influence.
The most local and often most critical trust boundary.
04B
The lecture builds from structure to consequences. Threats are important because of how they affect observation and control.
Entry to a critical zone or point without proper authority.
Loss of hardware, hidden interfaces, or malicious replacement.
Breaks communication, power, or trusted measurement paths.
Intentional physical interference with equipment or conditions.
Directly affects availability, visibility, and control.
Maintenance interfaces used to bypass normal digital controls.
Heat, dust, moisture, vibration, and EMI can become security-relevant.
Legitimate presence combined with illegitimate action.
High-impact local access to controllers, ports, power, and wiring.
04C
Lecture 3 lays out a proper analytical toolbox, not only a list of barriers and devices.
05
A larger term set drawn from the long-form lectures. Use search to filter by concept, layer, or method.
A system that tightly links computation, communication, and physical processes.
A cycle where the system measures the result of its action and adjusts the next action.
Behavior where correct timing is essential, not only correct logic.
A device that measures the physical world and provides data to the system.
A component that turns digital decisions into physical action.
A deviation from normal behavior that may be caused by an attack, fault, or misconfiguration.
A malicious action intended to compromise confidentiality, integrity, availability, or control safety.
The ability to see and interpret what is happening in the system and its environment.
The ability of the system to influence the physical process as intended.
Division of the network into controlled zones to reduce risk propagation.
Extra components or paths that allow the system to keep working during failures.
A local interface used for maintenance or diagnostics that can become a critical security point.
A specialized computing system built into a device to perform a specific function.
A network of connected devices focused on communication, sensing, and platform integration.
The execution of a computed command in the physical world.
Data describing the state of an object, process, or infrastructure component.
The ability to track where data came from and how it changed through the system.
The usefulness of data with respect to accuracy, timeliness, consistency, and meaning.
A practical digital representation of a real system connected to its life cycle and operation.
The coordinated use of several models or simulators to represent one complex system.
Checking whether a model or system has been built correctly against its specification.
Checking whether a model or system corresponds adequately to the real target process.
A parameter the system tries to keep within desired bounds.
An internal or external influence that pushes the system away from its target behavior.
The ability of a system to preserve or recover acceptable behavior after disturbance.
The property of being operational and accessible when needed.
The ability to absorb disruption, adapt, and continue operating acceptably.
A mode that restricts or stops operation to maintain physical safety.
A degraded mode where the system keeps partial functionality instead of complete shutdown.
Operational technology: systems directly involved in monitoring and controlling physical processes.
Traditional information technology focused on business data, services, and user systems.
Supervisory Control and Data Acquisition systems for centralized monitoring and control.
Human-Machine Interface used by operators to observe and influence the system.
A Programmable Logic Controller used for local industrial automation and control.
A Remote Terminal Unit used to collect data and execute control in distributed systems.
A system that stores time-series operational data for analysis and traceability.
Flow-level metadata sources that describe who communicated, when, and how much.
A dedicated hardware observation point for passively copying network traffic.
Systems that detect, and sometimes block, suspicious or malicious network behavior.
A platform that aggregates and correlates logs and security events from many sources.
Network Detection and Response focused on behavior-based detection in network telemetry.
A defined model of expected network or system behavior used to judge anomalies.
A boundary where crossing from one physical area to another changes the level of trust and risk.
A physical area analyzed as a distinct security space with its own access meaning and critical assets.
An event indicating unauthorized opening, interference, or state change in a protected component.
Monitoring of operating conditions such as temperature, humidity, dust, vibration, or electromagnetic effects.
A structured record of which physical assets exist, where they are, and what role they serve.
Intentional physical interference meant to degrade, stop, or distort system operation.
The set of conditions within which the system is expected to function acceptably.
The ability of a model or controller to remain effective under uncertainty and imperfect data.
06