DMDT : Cyber risk and cybersecurity

Catalog of Institut Mines-Télécom Business School courses

Code

MGFE MIS 5208

Level

M2

Field

Systèmes d’information

Language

Anglais/English

ECTS Credits

2

Class hours

18

Program Manager(s)

Department

  • Technologies, Information et Management

Educational team

Introduction to the module

Recent and rapid developments in IT have contributed to the acceleration of information exchanges. Companies are now faced with effectively controlling the confidentiality, integrity and availability of this information. A real hot-spot, the information system is often the prey of multiple attacks which threaten the economic activity of companies and require the implementation of an internal security policy.

The concept of IS cybersecurity therefore covers a set of methods, techniques and tools responsible for protecting the resources of an IT system in order to ensure the availability of services, the confidentiality and integrity of information.

Exchanges, particularly through the Internet, have also made it necessary to develop new properties such as authentication, authorship and traceability of information.

Learning goals/Programme objectives

  • LG1 Being able to extend digital intelligence through its different dimensions

Learning objectives/Intended learning outcomes

  • 1.1 - Develop digital citizenship and prosperity
  • 2.1 - Identify and analyze in depth problems, causes and impacts
  • 2.2 - Explore solutions, decisions, and their relative and absolute impacts
  • 3.1 - Understand and employ basic concepts, knowledge and theories related to the discipline
  • 3.2 - Apply discipline knowledge appropriately and effectively

Rubrics

This course will address security in a global context and will take into account the following aspects:
- Raising user awareness of cybersecurity issues
- Logical security, that is to say security at the data level, in particular company data, applications or even operating systems.
- Telecommunications security: network technologies, company servers, access networks, etc.

Content : structure and schedule

The concept of risk
- Types of risk
- Risk management
- Risks linked to information systems
Cyber security: what stakes in enterprises?
- Overview of cyber criminality
- Tackling cyber security stakes : governance, protection, defense, resilience
- Cyber Warfare Game

Learning delivery

synchrone

Pedagogical methods

Lectures + case studies

Evaluation and grading system and catch up exams

Grading: Group projects and individual exercises
Catch up exam: Quiz + homework

Module Policies

Professor-Student Communication
● The professor will contact the students through their school email address (IMT-BS/TSP) and the Moodle portal. No communication via personal email addresses will take place. It is the student responsibility to regularly check their IMT-BS/TSP mailbox.
● Students can communicate with the professor by emailing him/her to his institutional address. If necessary, it is possible to meet the professor in his office during office-hours or by appointment.

Students with accommodation needs
If a student has a disability that will prevent from completing the described work or require any kind of accommodation, he may inform the program director (with supporting documents) as soon as possible. Also, students are encouraged to discuss it with the professor.

Class behavior
● Out of courtesy for the professor and classmates, all mobile phones, electronic games or other devices that generate sound should be turned off during class.
● Students should avoid disruptive and disrespectful behavior such as: arriving late, leaving early, careless behavior (e.g. sleeping, reading a non-course material, using vulgar language, over-speaking, eating, drinking, etc.). A warning may be given on the first infraction of these rules. Repeated violators will be penalized and may face expulsion from the class and/or other disciplinary proceedings.
● The tolerated delay is 5 minutes. Attendance will be declared on Moodle during these 5 minutes via a QR code provided by the teacher at each course start.
● Student should arrive on time for exams and other assessments. No one will be allowed to enter the classroom once the first person has finished the exam and left the room. There is absolutely no exception to this rule. No student can continue to take an exam once the time is up. No student may leave the room during an examination unless he / she has finished and handed over all the documents.
● In the case of remote learning, the student must keep his camera on unless instructed otherwise by the professor.

Honor code
IMT-BS is committed to a policy of honesty in the academic community. Conduct that compromises this policy may result in academic and / or disciplinary sanctions. Students must refrain from cheating, lying, plagiarizing and stealing. This includes completing your own original work and giving credit to any other person whose ideas and printed materials (including those from the Internet) are paraphrased or quoted directly. Any student who violates or helps another student violate academic behavior standards will be penalized according to IMT-BS rules.

Textbook Required and Suggested Readings

- Michael T. Goodrich and Roberto Tamassia: "Introduction to Computer Security", Boston : Addison-Wesley, 2011
- William Stallings and Lawrie Brown: "Computer Security: Principles and Practice", Pearson, 2021

Keywords

Cyber security, cyber hacking, IT security management

Prerequisites

None