DMDT : Cyber risk and cybersecurity

Catalogue des cours de Institut Mines-Télécom Business School

Code

MGFE MIS 5208

Niveau

M2

Discipline

Systèmes d’information

Langue

Anglais/English

Crédits ECTS

2

Heures programmées

18

Coordonnateur(s)

Département

  • Technologies, Information et Management

Equipe pédagogique

Introduction au module

Recent and rapid developments in IT have contributed to the acceleration of information exchanges. Companies are now faced with effectively controlling the confidentiality, integrity and availability of this information. A real hot-spot, the information system is often the prey of multiple attacks which threaten the economic activity of companies and require the implementation of an internal security policy.

The concept of IS cybersecurity therefore covers a set of methods, techniques and tools responsible for protecting the resources of an IT system in order to ensure the availability of services, the confidentiality and integrity of information.

Exchanges, particularly through the Internet, have also made it necessary to develop new properties such as authentication, authorship and traceability of information.

Objectifs d'apprentissage (compétences mères)

  • 2.3 - Conduire une analyse réflexive et distanciée prenant en compte les enjeux, les problématiques et la complexité d'une demande ou d'une situation afin de proposer des solutions adaptées et/ou innovantes en respect des évolutions de la règlementation.
  • 3.2 - Communiquer de manière efficace et pertinente, à des fins de formation, de transfert de connaissances, de compétences ou d'innovation, en français et dans au moins une langue étrangère, dont l'anglais, et dans un contexte global et multiculturel.
  • 4.2 - Conduire un projet complexe en responsabilité, dont l'objectif est d'accompagner le transformation des organisations (conception, pilotage, coordination d'équipe, mise en oeuvre et gestion, contrôle, dissémination), en mobilisant des compétences plu

Traits de compétences

This course will address security in a global context and will take into account the following aspects:
- Raising user awareness of cybersecurity issues
- Logical security, that is to say security at the data level, in particular company data, applications or even operating systems.
- Telecommunications security: network technologies, company servers, access networks, etc.

Contenu : structure du module et agenda

The concept of risk
- Types of risk
- Risk management
- Risks linked to information systems
Cyber security: what stakes in enterprises?
- Overview of cyber criminality
- Tackling cyber security stakes : governance, protection, defense, resilience
- Cyber Warfare Game

Contribution à l'atteinte des ODD (Objets du Développement Durable)

This course contributes to SDG 9 (Industry, Innovation and Infrastructure) and SDG 16 (Peace, Justice and Effective Institutions) by teaching students how to protect the digital systems that modern organizations and public services rely on. The course develops practical skills in cyber risk assessment, security governance, and incident response, enabling students to support resilient and trustworthy infrastructures that sustain innovation. It also emphasizes accountability, responsible decision-making, and balancing between different risk management factors, which help students understand the dilemmas of security management.

Apprentissage

synchrone

Méthode pédagogique

Lectures + case studies + scenario-based solution discussion

Système de notation et modalités de rattrapage

Grading: Group project (60%), individual practical exploration (20%), in-class tabletop exercise (20%).
Catch up exam: Practical consultancy and conceptual reflection in writing format.

Règlement du module

Professor-Student Communication
● The professor will contact the students through their school email address (IMT-BS/TSP) and the Moodle portal. No communication via personal email addresses will take place. It is the student responsibility to regularly check their IMT-BS/TSP mailbox.
● Students can communicate with the professor by emailing him/her to his institutional address. If necessary, it is possible to meet the professor in his office during office-hours or by appointment.

Students with accommodation needs
If a student has a disability that will prevent from completing the described work or require any kind of accommodation, he may inform the program director (with supporting documents) as soon as possible. Also, students are encouraged to discuss it with the professor.

Class behavior
● Out of courtesy for the professor and classmates, all mobile phones, electronic games or other devices that generate sound should be turned off during class.
● Students should avoid disruptive and disrespectful behavior such as: arriving late, leaving early, careless behavior (e.g. sleeping, reading a non-course material, using vulgar language, over-speaking, eating, drinking, etc.). A warning may be given on the first infraction of these rules. Repeated violators will be penalized and may face expulsion from the class and/or other disciplinary proceedings.
● The tolerated delay is 5 minutes. Attendance will be declared on Moodle during these 5 minutes via a QR code provided by the teacher at each course start.
● Student should arrive on time for exams and other assessments. No one will be allowed to enter the classroom once the first person has finished the exam and left the room. There is absolutely no exception to this rule. No student can continue to take an exam once the time is up. No student may leave the room during an examination unless he / she has finished and handed over all the documents.
● In the case of remote learning, the student must keep his camera on unless instructed otherwise by the professor.

Honor code
IMT-BS is committed to a policy of honesty in the academic community. Conduct that compromises this policy may result in academic and / or disciplinary sanctions. Students must refrain from cheating, lying, plagiarizing and stealing. This includes completing your own original work and giving credit to any other person whose ideas and printed materials (including those from the Internet) are paraphrased or quoted directly. Any student who violates or helps another student violate academic behavior standards will be penalized according to IMT-BS rules.

Références obligatoires et lectures suggérées

- Michael T. Goodrich and Roberto Tamassia: "Introduction to Computer Security", Boston : Addison-Wesley, 2011
- William Stallings and Lawrie Brown: "Computer Security: Principles and Practice", Pearson, 2021

Mots-clés

Cyber security, cyber hacking, IT security management

Prérequis

None