Number of hours
- Lectures 12.0
- Projects -
- Tutorials -
- Internship -
- Laboratory works -
- Written tests -
ECTS
ECTS 1.0
Goal(s)
Computer security is a major concern in the digital world, especially with respect to data. In the context of big data, integrity and privacy are issues that need to be certified. The course addresses cybersecurity, confidentiality and privacy from a point of view both technical and organizational.
Jean-Louis ROCH
Content(s)
Web page of the course: https://chamilo.grenoble-inp.fr/courses/ENSIMGWMMBESIC/index.php?id_session=0
• authentication theory ans protocols
• foundations of cybersecurity
• threats: modelling and analysis
• privacy and related challenges
• secure architectures: PKI and blockchains
Basic level (L2) in computer and math.For the practical work, pratcical knowledge of programming and computer systems.
50% Practical homework with evaluation by peers
50% Written exam (2h, all documents are authorized)
Calcul Note = 50% * Examen + 50%*MAX( Examen, TP)
SESSION NORMALE :
Type d'examen (écrit, oral, examen sur machine) : écrit
Salle spécifique : Non
Durée : 2h
Documents autorisés (ex : aucun, résumé feuille A4 manuscrite, dictionnaires, tous documents) :tous documents autorisés
Documents interdits (ex : livres, tous documents) :
Matériel (ex : calculatrices):
- matériel autorisé, préciser : calculatrice
- matériel interdit, préciser : tous
Commentaires :
SESSION DE RATTRAPAGE :
Type d'examen (écrit, oral, examen sur machine) : oral si # étudiants ?5 ; sinon écrit.
Salle spécifique : non
Durée : 30' si oral; 1h30 si examen.
Documents autorisés (ex : aucun, résumé feuille A4 manuscrite, dictionnaires, tous documents) :aucun
Documents interdits (ex : livres, tous documents) : aucun
Matériel (ex : calculatrices):
- matériel autorisé, préciser :aucun
- matériel interdit, préciser :tous
Commentaires :
The course exists in the following branches:
- Curriculum - Big-Data Post-Graduate Program - Semester 9
Course ID : WMMBESEC
Course language(s):
You can find this course among all other courses.
ANSSI : https://www.ssi.gouv.fr
JG Dumas, JL Roch, E Tannier, S Varrette, Fundation of coding, Wiley, 2015.
JG Dumas, JL Roch, E Tannier, S Varrette, Théorie des codes: compression, cryptage, correction (3ème édition). Dunod, 2018
JG Dumas, P Laforucade, A Tichit, S Varrette. Les blockchains en 50 questions- Dunod, Sept. 2018
C. Lauradoux, Vincent Roca, FUN MOOC Protection de la vie privée https://www.fun-mooc.fr/courses/course-v1:inria+41015+session02/about
B. Schneier Applied Cryptography - Protocols, Algorithms and source code in C, Wiley, 1996