DMDT : Cyber risk and cybersecurity

Catalogue des cours de Institut Mines-Télécom Business School

Code

MGFE MIS 5208

Niveau

M2

Discipline

Systèmes d’information

Langue

Anglais/English

Crédits ECTS

2

Heures programmées

18

Coordonnateur(s)

Département

  • Technologies, Information et Management

Equipe pédagogique

Introduction au module

Recent and rapid developments in IT have contributed to the acceleration of information exchanges. Companies are now faced with effectively controlling the confidentiality, integrity and availability of this information. A real hot-spot, the information system is often the prey of multiple attacks which threaten the economic activity of companies and require the implementation of an internal security policy.

The concept of IS cybersecurity therefore covers a set of methods, techniques and tools responsible for protecting the resources of an IT system in order to ensure the availability of services, the confidentiality and integrity of information.

Exchanges, particularly through the Internet, have also made it necessary to develop new properties such as authentication, authorship and traceability of information.

Finalité d'apprentissage (Bloc de compétences)

  • LG1 Être capable d'étendre sa propre intelligence digitale à travers ses différentes dimensions (de manière responsable et durable)

Objectifs d'apprentissage (compétences mères)

  • 1.1 - Développer la citoyenneté numérique et la prospérité sociétale
  • 2.1 - Identifier et analyser en profondeur les problèmes, les causes et les impacts
  • 2.2 - Explorer les solutions, les décisions et leurs impacts relatifs et absolus
  • 3.1 - Comprendre et utiliser les concepts de base, les connaissances et les théories liées à la discipline
  • 3.2 - Appliquer les connaissances de la discipline de manière appropriée et efficace

Traits de compétences

This course will address security in a global context and will take into account the following aspects:
- Raising user awareness of cybersecurity issues
- Logical security, that is to say security at the data level, in particular company data, applications or even operating systems.
- Telecommunications security: network technologies, company servers, access networks, etc.

Contenu : structure du module et agenda

The concept of risk
- Types of risk
- Risk management
- Risks linked to information systems
Cyber security: what stakes in enterprises?
- Overview of cyber criminality
- Tackling cyber security stakes : governance, protection, defense, resilience
- Cyber Warfare Game

Apprentissage

synchrone

Méthode pédagogique

Lectures + case studies

Système de notation et modalités de rattrapage

Grading: Group projects and individual exercises
Catch up exam: Quiz + homework

Règlement du module

Professor-Student Communication
● The professor will contact the students through their school email address (IMT-BS/TSP) and the Moodle portal. No communication via personal email addresses will take place. It is the student responsibility to regularly check their IMT-BS/TSP mailbox.
● Students can communicate with the professor by emailing him/her to his institutional address. If necessary, it is possible to meet the professor in his office during office-hours or by appointment.

Students with accommodation needs
If a student has a disability that will prevent from completing the described work or require any kind of accommodation, he may inform the program director (with supporting documents) as soon as possible. Also, students are encouraged to discuss it with the professor.

Class behavior
● Out of courtesy for the professor and classmates, all mobile phones, electronic games or other devices that generate sound should be turned off during class.
● Students should avoid disruptive and disrespectful behavior such as: arriving late, leaving early, careless behavior (e.g. sleeping, reading a non-course material, using vulgar language, over-speaking, eating, drinking, etc.). A warning may be given on the first infraction of these rules. Repeated violators will be penalized and may face expulsion from the class and/or other disciplinary proceedings.
● The tolerated delay is 5 minutes. Attendance will be declared on Moodle during these 5 minutes via a QR code provided by the teacher at each course start.
● Student should arrive on time for exams and other assessments. No one will be allowed to enter the classroom once the first person has finished the exam and left the room. There is absolutely no exception to this rule. No student can continue to take an exam once the time is up. No student may leave the room during an examination unless he / she has finished and handed over all the documents.
● In the case of remote learning, the student must keep his camera on unless instructed otherwise by the professor.

Honor code
IMT-BS is committed to a policy of honesty in the academic community. Conduct that compromises this policy may result in academic and / or disciplinary sanctions. Students must refrain from cheating, lying, plagiarizing and stealing. This includes completing your own original work and giving credit to any other person whose ideas and printed materials (including those from the Internet) are paraphrased or quoted directly. Any student who violates or helps another student violate academic behavior standards will be penalized according to IMT-BS rules.

Références obligatoires et lectures suggérées

- Michael T. Goodrich and Roberto Tamassia: "Introduction to Computer Security", Boston : Addison-Wesley, 2011
- William Stallings and Lawrie Brown: "Computer Security: Principles and Practice", Pearson, 2021

Mots-clés

Cyber security, cyber hacking, IT security management

Prérequis

None