Aller au menu Aller au contenu
Une voie, plusieurs choix
Informatique et Mathématiques appliquées
Une voie, plusieurs choix

> Formation > Cursus ingénieur

Computer Science Security and Confidentiality - 5MMSIC9

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In
  • Number of hours

    • Lectures : 12.0
    • Tutorials : -
    • Laboratory works : -
    • Projects : -
    • Internship : -
    • Written tests : -
    ECTS : 2.0
  • Officials : Jean-Louis ROCH

Goals

Computer security is a major concern in the digital world, especially with respect to data. In the context of big data, integrity and privacy are issues that need to be certified. The course addresses cybersecurity, confidentiality and privacy from a point of view both technical and organizational.

Content

Web page of the course: https://chamilo.grenoble-inp.fr/courses/ENSIMGWMMBESIC/index.php?id_session=0
• authentication theory ans protocols
• foundations of cybersecurity
• threats: modelling and analysis
• privacy and related challenges
• secure architectures: PKI and blockchains

Prerequisites

Basic level (L2) in computer and math.For the practical work, pratcical knowledge of programming and computer systems.

Tests

50% Practical homework with evaluation by peers
50% Written exam (2h, all documents are authorized)

Examen écrit de 2H; tous documents autorisés.
NOTE = 50% TP + 50% Examen

Calendar

The course exists in the following branches:

  • Curriculum - Financial Engineering - Semester 9
see the course schedule for 2020-2021

Additional Information

Course ID : 5MMSIC9
Course language(s): FR

The course is attached to the following structures:

You can find this course among all other courses.

Bibliography

ANSSI : https://www.ssi.gouv.fr
JG Dumas, JL Roch, E Tannier, S Varrette, Fundation of coding, Wiley, 2015.
JG Dumas, JL Roch, E Tannier, S Varrette, Théorie des codes: compression, cryptage, correction (3ème édition). Dunod, 2018
JG Dumas, P Laforucade, A Tichit, S Varrette. Les blockchains en 50 questions- Dunod, Sept. 2018
C. Lauradoux, Vincent Roca, FUN MOOC Protection de la vie privée https://www.fun-mooc.fr/courses/course-v1:inria+41015+session02/about
B. Schneier Applied Cryptography - Protocols, Algorithms and source code in C, Wiley, 1996

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In

Date of update March 10, 2020

Université Grenoble Alpes