Code
MGSF MIS 4810
Level
M1
Field
Systèmes d’information
Language
Français/French
ECTS Credits
3
Class hours
24
Total student load
60
Program Manager(s)
Department
- Technologies, Information et Management
Educational team
Introduction to the module
L’expansion mondiale du numérique a entraîné l’augmentation des vulnérabilités et la diversification des menaces. Cela s’est d’autant plus vérifié lors de la crise de la Covid-19. Durant cette période inédite, 70 % des travailleurs se sont retrouvés en télétravail. Face à ces menaces plus nombreuses et sophistiquées, les entreprises deviennent conscientes des enjeux de la cybersécurité. Pour se protéger, elles se dotent donc de plus en plus d’experts en sécurité et de solutions nouvelles.
Dans ce contexte, il est essentiel pour les étudiant.es managers de développer une compréhension fine du domaine cybersécurité qui impactera à coup sûr leur futur métier.
L'objectif de ce module est donc d'apporter aux étudiants.es les clefs pour une meilleure compréhension du risque cybersécurité et des moyens leur permettant de le prendre en compte dans leur futur métier.
A la fin de ce cours, les étudiants seront en mesure de :
- Comprendre le contexte général du Risque Cybersécurité afin de pouvoir le prendre en compte efficacement dans son futur métier
- Comprendre et mettre en œuvre de manière opérationnelle un Système de Management de la Sécurité de l’Information selon la norme ISO27001
- Mettre en œuvre de manière opérationnelle les principales activités en matière de Maitrise des Risques SSI
- Connaître les principales mesures de protections techniques et organisationnelles contre la menace Cybersécurité*
- Comprendre et connaître l’environnement juridique et normatif applicables au domaine de la Sécurité des S.I.
Learning goals/Programme objectives
- LG1 Being able to extend digital intelligence through its different dimensions
- LG2 Having the ability to manage uncertainty and complexity with accuracy and rigor
- LG3 Having the foundations of responsible and sustainable management
- LG4 Having access to different cross disciplinary management approaches and tools
Learning objectives/Intended learning outcomes
- 2.1 - Identify and analyze in depth problems, causes and impacts
- 2.4 - Implement a plan, prepare for changes, and measure the success of actions with regard to strategy and stakeholder
- 3.1 - Understand and employ basic concepts, knowledge and theories related to the discipline
- 3.2 - Apply discipline knowledge appropriately and effectively
- 4.6 - Développer les enjeux du développement durable dans ses trois composantes (environnementale, sociale, économique)
Content : structure and schedule
- Contexte de la Sécurité des Systèmes d'Information
- Le système de Management de la Sécurité des Systèmes d'Information
- Les grands processus de maîtrise de la Sécurité des Systèmes d'Information
- Les grandes solutions de sécurité
- Environnement juridique, normatif et réglementaire
Pedagogical methods
Illustrations concrètes à travers des documents d’actualité
Mise en situation sur la base de cas concrets
Session de travaux dirigés/pratiques
Evaluation and grading system and catch up exams
Final Assessment= Mini project (80%)
Continuous Assessment= Individual MCQ (20%)
Module Policies
Professor-Student Communication
● The professor will contact the students through their school email address (IMT-BS/TSP) and the Moodle portal. No communication via personal email addresses will take place. It is the student responsibility to regularly check their IMT-BS/TSP mailbox.
● Students can communicate with the professor by emailing him/her to his institutional address. If necessary, it is possible to meet the professor in his office during office-hours or by appointment.
Students with accommodation needs
If a student has a disability that will prevent from completing the described work or require any kind of accommodation, he may inform the program director (with supporting documents) as soon as possible. Also, students are encouraged to discuss it with the professor.
Class behavior
● Out of courtesy for the professor and classmates, all mobile phones, electronic games or other devices that generate sound should be turned off during class.
● Students should avoid disruptive and disrespectful behavior such as: arriving late, leaving early, careless behavior (e.g. sleeping, reading a non-course material, using vulgar language, over-speaking, eating, drinking, etc.). A warning may be given on the first infraction of these rules. Repeated violators will be penalized and may face expulsion from the class and/or other disciplinary proceedings.
● The tolerated delay is 5 minutes. Attendance will be declared on Moodle during these 5 minutes via a QR code provided by the teacher at each course start.
● Student should arrive on time for exams and other assessments. No one will be allowed to enter the classroom once the first person has finished the exam and left the room. There is absolutely no exception to this rule. No student can continue to take an exam once the time is up. No student may leave the room during an examination unless he / she has finished and handed over all the documents.
● In the case of remote learning, the student must keep his camera on unless instructed otherwise by the professor.
Honor code
IMT-BS is committed to a policy of honesty in the academic community. Conduct that compromises this policy may result in academic and / or disciplinary sanctions. Students must refrain from cheating, lying, plagiarizing and stealing. This includes completing your own original work and giving credit to any other person whose ideas and printed materials (including those from the Internet) are paraphrased or quoted directly. Any student who violates or helps another student violate academic behavior standards will be penalized according to IMT-BS rules.
Textbook Required and Suggested Readings
MOOC de l'ANSSI : https://secnumacademie.gouv.fr/
CNIL : https://www.cnil.fr/fr/comprendre-les-grands-principes-de-la-cryptologie-et-du-chiffrement
Cisco Press, Security Titles: http://www.ciscopress.com/store/browse.asp?st=42127
Keywords
Cybersecurity, Information Security, Privacy, Risk, Ethics