Aller au menu Aller au contenu
Our engineering & Master degrees


School of engineering in Physics, Applied Physics, Electronics & Materials
Science

Our engineering & Master degrees
Our engineering & Master degrees

> Studies

Information Systems Security - 5PMISSI1

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In
  • Number of hours

    • Lectures : 24.0
    • Tutorials : 12.0
    • Laboratory works : 0
    • Projects : 0
    • Internship : 0
    • Written tests : 0
    ECTS : 3.0

Goals

*Being able to understand the threats and vulnerabilities and manage a security policy
**Operating Systems
**networks infrastructures
**Applications and software engineering
**Protocols and security property
**Business Processes
*What actions to avoid / limit
**Guide to good practice and usage
**Security Policy for information systems / Audit
**Methodology

Contact Sebastien VIARDOT

Content

The module is largely based on the assignments to be made, consisting of fault analysis, the responses needed to limit the impacts (anticipation and reaction), and propose experiments to implement them.

The topics covered in the framed sessions are :

*Introduction to the course, legal warning, assignments presentation.
*Lab : Docker and vagrant, and setting up a security challenge
*Good and bad use of crypto
*Authentication methods
**Certificates PKI, Kerberos, oauth2, case, SSO
**PKI Certificate Lab
*Local vulnerability and good practices
**identification (3 factors), solutions. Identity theft
**media confidentiality - encryption / access
**Access rights and best practices
**Exploits and answers
**Hardware flaw, illustration via meltdown and spectrum (if not otherwise processed)
**Buffer overflow
*Network failures and good practices
**Snort Lab
*WEB security
**WEB security lab
*Protocol verification
**Protocol verification lab



Prerequisites

Having taken the following courses (or equivalent) is recommended:

*Operating System Design Project - Foundations
*Operating system and concurrent programming
*Security of systems and networks

Tests

CONTINUOUS CONTROL (CC):
Evaluation type:
Work to be done (alone or in pairs) on a vulnerability analysis and an experiment + Peer evaluation + Some lab works. A total of 2 works to be done and 6 peer reviews to be done.

NORMAL SESSION:
No written examination in limited time in normal session, evaluation in continuous control.

RETRIEVAL SESSION (E2):None



N1=CC
N2=N1

Additional Information

Curriculum->Engineering degree->Semester 9

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In

Date of update July 29, 2020

Contribuer





Vous voyez cet encadré, car vous avez des droits d'édition sur la page
Université Grenoble Alpes