Code
MGFE MIS 5208
Level
M2
Field
Systèmes d’information
Language
Anglais/English
ECTS Credits
2
Class hours
18
Program Manager(s)
Department
- Technologies, Information et Management
Educational team
Introduction to the module
Recent and rapid developments in IT have contributed to the acceleration of information exchanges. Companies are now faced with effectively controlling the confidentiality, integrity and availability of this information. A real hot-spot, the information system is often the prey of multiple attacks which threaten the economic activity of companies and require the implementation of an internal security policy.
The concept of IS cybersecurity therefore covers a set of methods, techniques and tools responsible for protecting the resources of an IT system in order to ensure the availability of services, the confidentiality and integrity of information.
Exchanges, particularly through the Internet, have also made it necessary to develop new properties such as authentication, authorship and traceability of information.
Learning goals/Programme objectives
- LG1 Being able to extend digital intelligence through its different dimensions
Learning objectives/Intended learning outcomes
- 1.1 - Develop digital citizenship and prosperity
- 2.1 - Identify and analyze in depth problems, causes and impacts
- 2.2 - Explore solutions, decisions, and their relative and absolute impacts
- 3.1 - Understand and employ basic concepts, knowledge and theories related to the discipline
- 3.2 - Apply discipline knowledge appropriately and effectively
Rubrics
This course will address security in a global context and will take into account the following aspects:
- Raising user awareness of cybersecurity issues
- Logical security, that is to say security at the data level, in particular company data, applications or even operating systems.
- Telecommunications security: network technologies, company servers, access networks, etc.
Content : structure and schedule
The concept of risk
- Types of risk
- Risk management
- Risks linked to information systems
Cyber security: what stakes in enterprises?
- Overview of cyber criminality
- Tackling cyber security stakes : governance, protection, defense, resilience
- Cyber Warfare Game
Learning delivery
synchrone
Pedagogical methods
Lectures + case studies
Evaluation and grading system and catch up exams
Grading: Group projects and individual exercises
Catch up exam: Quiz + homework
Module Policies
Professor-Student Communication
● The professor will contact the students through their school email address (IMT-BS/TSP) and the Moodle portal. No communication via personal email addresses will take place. It is the student responsibility to regularly check their IMT-BS/TSP mailbox.
● Students can communicate with the professor by emailing him/her to his institutional address. If necessary, it is possible to meet the professor in his office during office-hours or by appointment.
Students with accommodation needs
If a student has a disability that will prevent from completing the described work or require any kind of accommodation, he may inform the program director (with supporting documents) as soon as possible. Also, students are encouraged to discuss it with the professor.
Class behavior
● Out of courtesy for the professor and classmates, all mobile phones, electronic games or other devices that generate sound should be turned off during class.
● Students should avoid disruptive and disrespectful behavior such as: arriving late, leaving early, careless behavior (e.g. sleeping, reading a non-course material, using vulgar language, over-speaking, eating, drinking, etc.). A warning may be given on the first infraction of these rules. Repeated violators will be penalized and may face expulsion from the class and/or other disciplinary proceedings.
● The tolerated delay is 5 minutes. Attendance will be declared on Moodle during these 5 minutes via a QR code provided by the teacher at each course start.
● Student should arrive on time for exams and other assessments. No one will be allowed to enter the classroom once the first person has finished the exam and left the room. There is absolutely no exception to this rule. No student can continue to take an exam once the time is up. No student may leave the room during an examination unless he / she has finished and handed over all the documents.
● In the case of remote learning, the student must keep his camera on unless instructed otherwise by the professor.
Honor code
IMT-BS is committed to a policy of honesty in the academic community. Conduct that compromises this policy may result in academic and / or disciplinary sanctions. Students must refrain from cheating, lying, plagiarizing and stealing. This includes completing your own original work and giving credit to any other person whose ideas and printed materials (including those from the Internet) are paraphrased or quoted directly. Any student who violates or helps another student violate academic behavior standards will be penalized according to IMT-BS rules.
Textbook Required and Suggested Readings
- Michael T. Goodrich and Roberto Tamassia: "Introduction to Computer Security", Boston : Addison-Wesley, 2011
- William Stallings and Lawrie Brown: "Computer Security: Principles and Practice", Pearson, 2021
Keywords
Cyber security, cyber hacking, IT security management
Prerequisites
None